View online: https://www.drupal.org/node/2378441
* Advisory ID: DRUPAL-SA-CONTRIB-2014-115
* Project: Form Builder [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2014-November-19
* Security risk: 14/25 ( Moderately Critical)
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Form Builder module enables users to build entire Form API structures
through a graphical, AJAX-like interface.
The module doesn't sufficiently sanitize form titles in some cases.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission to create forms in another module that depends on Form
Builder, such as Survey Builder, Webform, or others.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Form Builder 7.x-1.x versions prior to 7.x-1.6.
* Form Builder 6.x-1.x versions prior to 6.x-1.6.
Drupal core is not affected. If you do not use the contributed Form Builder
[4] module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Form Builder module for Drupal 7.x, upgrade to Form
Builder
7.x-1.6 [5]
* If you use the Form Builder module for Drupal 6.x, upgrade to Form
Builder
6.x-1.6 [6]
Also see the Form Builder [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Matt Vance [8] provisional member of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Francisco José Cruz Romanos [9] provisional member of the Drupal
Security
Team
* Nate Haug [10]
-------- COORDINATED BY
------------------------------------------------------
* Matt Vance [11] provisional member of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]
[1] https://www.drupal.org/project/form_builder
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/form_builder
[5] https://www.drupal.org/node/2378445
[6] https://www.drupal.org/node/2378433
[7] https://www.drupal.org/project/form_builder
[8] https://www.drupal.org/user/88338
[9] https://www.drupal.org/user/848238
[10] https://www.drupal.org/user/35821
[11] https://www.drupal.org/user/88338
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/SA-CORE-2014-006
* Advisory ID: DRUPAL-SA-CORE-2014-006
* Project: Drupal core [1]
* Version: 6.x, 7.x
* Date: 2014-November-19
* Security risk: 14/25 ( Moderately Critical)
AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:Uncommon [2]
* Vulnerability: Multiple vulnerabilities
-------- DESCRIPTION
---------------------------------------------------------
.... Session hijacking (Drupal 6 and 7)
A specially crafted request can give a user access to another user's session,
allowing an attacker to hijack a random session.
This attack is known to be possible on certain Drupal 7 sites which serve
both HTTP and HTTPS content ("mixed-mode" [3]), but it is possible there are
other attack vectors for both Drupal 6 and Drupal 7.
.... Denial of service (Drupal 7 only)
Drupal 7 includes a password hashing API to ensure that user supplied
passwords are not stored in plain text.
A vulnerability in this API allows an attacker to send specially crafted
requests resulting in CPU and memory exhaustion. This may lead to the site
becoming unavailable or unresponsive (denial of service).
This vulnerability can be exploited by anonymous users.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [4] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Drupal core 6.x versions prior to 6.34.
* Drupal core 7.x versions prior to 7.34.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Drupal 6.x, upgrade to Drupal core 6.34. [5]
* If you use Drupal 7.x, upgrade to Drupal core 7.34. [6]
If you have configured a custom password.inc file for your Drupal 7 site you
also need to make sure that it is not prone to the same denial of service
vulnerability. See also the similar security advisory for the Drupal 6
contributed Secure Password Hashes module: SA-CONTRIB-2014-113 [7]
Also see the Drupal core [8] project page.
-------- REPORTED BY
---------------------------------------------------------
Session hijacking:
* Aaron Averill [9]
Denial of service:
* Michael Cullum [10]
* Javier Nieto [11]
* Andrés Rojas Guerrero [12]
-------- FIXED BY
------------------------------------------------------------
Session hijacking:
* Klaus Purer [13] of the Drupal Security Team
* David Rothstein [14] of the Drupal Security Team
* Peter Wolanin [15] of the Drupal Security Team
Denial of service:
* Klaus Purer [16] of the Drupal Security Team
* Peter Wolanin [17] of the Drupal Security Team
* Heine Deelstra [18] of the Drupal Security Team
* Tom Phethean [19]
-------- COORDINATED BY
------------------------------------------------------
* The Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [20].
Learn more about the Drupal Security team and their policies [21], writing
secure code for Drupal [22], and securing your site [23].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [24]
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/https-information
[4] http://cve.mitre.org/
[5] https://www.drupal.org/drupal-6.34-release-notes
[6] https://www.drupal.org/drupal-7.34-release-notes
[7] https://www.drupal.org/node/2378367
[8] https://www.drupal.org/project/drupal
[9] https://www.drupal.org/user/1317732
[10] https://www.drupal.org/u/MichaelCu
[11] https://www.drupal.org/u/jnietotn
[12] https://www.drupal.org/u/c0r3dump3d
[13] https://www.drupal.org/u/klausi
[14] https://www.drupal.org/u/David_Rothstein
[15] https://www.drupal.org/u/pwolanin
[16] https://www.drupal.org/u/klausi
[17] https://www.drupal.org/u/pwolanin
[18] https://www.drupal.org/u/Heine
[19] https://www.drupal.org/u/tsphethean
[20] https://www.drupal.org/contact
[21] https://www.drupal.org/security-team
[22] https://www.drupal.org/writing-secure-code
[23] https://www.drupal.org/security/secure-configuration
[24] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2378401
* Advisory ID: DRUPAL-SA-CONTRIB-2014-114
* Project: Tournament [1] (third-party module)
* Version: 7.x
* Date: 2013-November-19
* Security risk: 8/25 ( Less Critical)
AC:Basic/A:User/CI:None/II:None/E:Theoretical/TD:All [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
This project allows you to create various types of tournaments (as nodes) and
associated teams, tournaments, and matches.
There are several cases in the project where an account username, node title,
and team entity title are not correctly filtered before being displayed to a
user.
It is possible to create nodes or entities containing XSS or usernames could
be imported with XSS in the strings or created via an add-on module like LDAP
or similar.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permissions "Create new teams" or "Tournament: Create new content"
or "Match: Create new content" or the ability to create users with an XSS
payload in the usernames (Drupal core's input validation prevents XSS
payloads in usernames).
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Tournament 7.x-1.x any version
Drupal core is not affected. If you do not use the contributed Tournament [4]
module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Tournament module for Drupal 7.x, upgrade to Tournament
7.x-1.2 [5]
Also see the Tournament [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Matt V. [7]
-------- FIXED BY
------------------------------------------------------------
* Joe Fender [8] the module maintainer
* Matt Vance [9] provisional member of the Drupal Security Team
* Greg Knaddison [10] of the Drupal Security Team
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]
[1] https://www.drupal.org/project/tournament
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/tournament
[5] https://www.drupal.org/node/2378289
[6] https://www.drupal.org/project/tournament
[7] https://www.drupal.org/u/matt-v.
[8] https://www.drupal.org/u/fenda
[9] https://www.drupal.org/u/matt-v.
[10] https://www.drupal.org/u/greggles
[11] https://www.drupal.org/u/greggles
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2378367
* Advisory ID: DRUPAL-SA-CONTRIB-2014-113
* Project: Secure Password Hashes [1] (third-party module)
* Version: 6.x
* Date: 2014-11-19
* Security risk: 11/25 ( Moderately Critical)
AC:Basic/A:None/CI:None/II:None/E:Proof/TD:All [2]
* Vulnerability: Denial of Service
-------- DESCRIPTION
---------------------------------------------------------
This module enables a more secure password storage for Drupal 6 by
back-porting the code used in Drupal 7 core.
A vulnerability in this API allows an attacker to send specially crafted
requests resulting in CPU and memory exhaustion. This may lead to the site
becoming unavailable or unresponsive (denial of service).
This vulnerability can be exploited by anonymous users
See also: https://www.drupal.org/SA-CORE-2014-006 [3]
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [4] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Secure Password Hashes 6.x-2.x versions prior to 6.x-2.1.
Drupal core is not affected. If you do not use the contributed Secure
Password Hashes [5] module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Secure Password Hashes module for Drupal 6.x, upgrade to
Secure Password Hashes 6.x-2.1 [6]
Also see the Secure Password Hashes [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Michael Cullum [8]
* Javier Nieto [9]
* Andrés Rojas Guerrero [10]
-------- FIXED BY
------------------------------------------------------------
* Peter Wolanin [11] the module maintainer and Drupal Security Team member
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [16]
[1] https://www.drupal.org/project/phpass
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/SA-CORE-2014-006
[4] http://cve.mitre.org/
[5] https://www.drupal.org/project/phpass
[6] https://www.drupal.org/node/2378375
[7] https://www.drupal.org/project/phpass
[8] https://www.drupal.org/u/MichaelCu
[9] https://www.drupal.org/u/jnietotn
[10] https://www.drupal.org/u/c0r3dump3d
[11] https://www.drupal.org/user/49851
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
[16] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2378287
* Advisory ID: DRUPAL-SA-CONTRIB-2014-112
* Project: Node Field [1] (third-party module)
* Version: 7.x
* Date: 2014-November-19
* Security risk: 7/25 ( Less Critical)
AC:Basic/A:User/CI:None/II:None/E:Theoretical/TD:Default [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
Node Field module allows you to add custom extra fields to single Drupal
nodes.
The module doesn't sufficiently sanitize user input for some of the module's
internal fields. This vulnerability is mitigated by the fact that an attacker
must have a role with the permission to create nodes.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Node Field 7.x-2.x versions prior to 7.x-2.45.
Drupal core is not affected. If you do not use the contributed Node Field [4]
module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Node Field module for Drupal 7.x, upgrade to Node Field
7.x-2.45 [5]
Also see the Node Field [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Matt Vance [7]
-------- FIXED BY
------------------------------------------------------------
* Leonid Kuznetsov [8] the module maintainer
* Leonid Mamaev [9] the module project manager
* Matt Vance [10]
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [11] of the Drupal Security Team
* David Rothstein [12] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [13].
Learn more about the Drupal Security team and their policies [14], writing
secure code for Drupal [15], and securing your site [16].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [17]
[1] https://www.drupal.org/project/node_field
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/node_field
[5] https://www.drupal.org/node/2373157
[6] https://www.drupal.org/project/node_field
[7] https://www.drupal.org/user/88338
[8] https://www.drupal.org/user/2997345
[9] https://www.drupal.org/user/1992676
[10] https://www.drupal.org/user/88338
[11] https://www.drupal.org/user/36762
[12] https://www.drupal.org/user/124982
[13] https://www.drupal.org/contact
[14] https://www.drupal.org/security-team
[15] https://www.drupal.org/writing-secure-code
[16] https://www.drupal.org/security/secure-configuration
[17] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2378279
* Advisory ID: DRUPAL-SA-CONTRIB-2014-111
* Project: Protected Pages [1] (third-party module)
* Version: 7.x
* Date: 2014-November-19
* Security risk: 11/25 ( Moderately Critical)
AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:Uncommon [2]
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
Protected Pages modules allows the administrator to secure any page in your
website by password by configuring a add path and the associated password.
The module did not sufficiently protect variations on the protected path.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Protected Pages 7.x-2.x versions prior to 7.x-2.2.
Drupal core is not affected. If you do not use the contributed Protected
Pages [4] module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* Upgrade to protected_pages 7.x-2.4 [5]
Also see the Protected Pages [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* Olaf Grabienski [7]
-------- FIXED BY
------------------------------------------------------------
* Varun Mishra [8] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Greg Knaddison [9] of the Drupal Security Team
* Michael Hess [10] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].
Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]
[1] https://www.drupal.org/project/protected_pages
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/protected_pages
[5] https://www.drupal.org/node/2353451
[6] https://www.drupal.org/project/protected_pages
[7] https://www.drupal.org/user/77861
[8] https://www.drupal.org/user/168948
[9] https://www.drupal.org/user/36762
[10] https://www.drupal.org/user/102818
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity
View online: https://www.drupal.org/node/2373981
* Advisory ID: DRUPAL-SA-CONTRIB-2014-109
* Project: Freelinking [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2014-November-12
* Security risk: 16/25 ( Critical)
AC:Basic/A:User/CI:All/II:All/E:Theoretical/TD:Uncommon [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Freelinking module implements a filter framework for easier creation of
HTML links to other pages on the site or to external sites.
The module does not sanitize the node title when providing a link to the
node, opening a Cross Site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that the person creating the
content containing the link must have a role that allows use of an unsafe
text format (e.g. "Full HTML"), or the Freelinking filter must be placed
/after/ all text sanitizion filters (e.g. "Limit allowed HTML tags") in an
otherwise safe text format (e.g. "Filtered HTML").
Please note that this vulnerability also existed the
freelinking_nodetitle.inc in versions prior to 6.x-3.4 and 7.x-3.4, but this
was patched in releases 6.x-3.4 and 7.x-3.4.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Freelinking 6.x-x.x versions prior to 6.x-3.5.
* Freelinking 7.x-x.x versions prior to 7.x-3.5.
Drupal core is not affected. If you do not use the contributed Freelinking
[4] module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Freelinking module for Drupal 6.x, upgrade to Freelinking
6.x-3.5 [5]
* If you use the Freelinking module for Drupal 7.x, upgrade to Freelinking
7.x-3.5 [6]
Please note that the plugin freelinking_path.inc contains multible
vulnerabilities and was removed in the releases 6.x-3.3 and 7.x-3.3. You
should check to see if this file is still present, and if it is: Remove it
from the plugin sub-directory /before/ you install the latest version.
Also see the Freelinking [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Cash Williams [8] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Cash Williams [9] of the Drupal Security Team
* Gisle Hannemyr [10], the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* Cash Williams [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at
https://www.drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13],
writing secure code for Drupal [14], and
securing your site [15].
[1] https://www.drupal.org/project/freelinking
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/freelinking
[5] https://www.drupal.org/node/2373117
[6] https://www.drupal.org/node/2373121
[7] https://www.drupal.org/project/freelinking
[8] https://www.drupal.org/u/cashwilliams
[9] https://www.drupal.org/u/cashwilliams
[10] https://www.drupal.org/u/gisle
[11] https://www.drupal.org/u/cashwilliams
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
View online: https://www.drupal.org/node/2373973
* Advisory ID: DRUPAL-SA-CONTRIB-2014-108
* Project: Webform Component Roles [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2014-November-12
* Security risk: 13/25 ( Moderately Critical)
AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:All [2]
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
The Webform component module enables site admins to limit visibility or
editability of webform components based on user roles.
The module doesn't sufficiently check that disabled component values are not
modified upon submission of the form.
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Webform Component Roles 6.x-1.x versions prior to 6.x-1.8.
* Webform Component Roles 7.x-1.x versions prior to 7.x-1.8.
Drupal core is not affected. If you do not use the contributed Webform
Component Roles [4] module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Webform Component Roles module for Drupal 6.x, upgrade to
Webform Component Roles 6.x-1.8 [5]
* If you use the Webform Component Roles module for Drupal 7.x, upgrade to
Webform Component Roles 7.x-1.8 [6]
Also see the Webform Component Roles [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Colleen Blaho [8]
-------- FIXED BY
------------------------------------------------------------
* Shawn Sheridan [9] the module maintainer
-------- COORDINATED BY
------------------------------------------------------
* David Rothstein [10] of the Drupal Security Team
* Greg Knaddison [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
[1] https://www.drupal.org/project/webform_component_roles
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/webform_component_roles
[5] https://www.drupal.org/node/2373471
[6] https://www.drupal.org/node/2373473
[7] https://www.drupal.org/project/webform_component_roles
[8] https://www.drupal.org/user/3042419
[9] https://www.drupal.org/user/138669
[10] https://www.drupal.org/user/124982
[11] https://www.drupal.org/user/36762
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration
View online: https://www.drupal.org/node/2373961
* Advisory ID: DRUPAL-SA-CONTRIB-2014-107
* Project: Scheduler [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2014-November-12
* Security risk: 14/25 ( Moderately Critical)
AC:None/A:Admin/CI:Some/II:Some/E:Theoretical/TD:Default [2]
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The Scheduler module allows nodes to be published and unpublished on
specified dates. The module allows administrators to provide additional help
text on the content editing form when scheduling is enabled.
The module doesn't sufficiently filter the help text which could lead to a
Cross Site Scripting (XSS) attack.
This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer scheduler".
-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in
accordance
with Drupal Security Team processes./
-------- VERSIONS AFFECTED
---------------------------------------------------
* Scheduler 6.x-1.x versions prior to 6.x-1.10.
* Scheduler 7.x-1.x versions prior to 7.x-1.3.
Drupal core is not affected. If you do not use the contributed Scheduler [4]
module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Scheduler module for Drupal 6.x, upgrade to Scheduler
6.x-1.10 [5]
* If you use the Scheduler module for Drupal 7.x, upgrade to Scheduler
7.x-1.3 [6]
Also see the Scheduler [7] project page.
-------- REPORTED BY
---------------------------------------------------------
* Matt Vance [8] of the Drupal Security Team
-------- FIXED BY
------------------------------------------------------------
* Matt Vance [9] of the Drupal Security Team
* Lee Rowlands [10] of the Drupal Security Team
-------- COORDINATED BY
------------------------------------------------------
* Lee Rowlands [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing
secure code for Drupal [14], and securing your site [15].
[1] https://www.drupal.org/project/scheduler
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/scheduler
[5] http://www.drupal.org/node/2373385
[6] https://www.drupal.org/node/2373369
[7] https://www.drupal.org/project/scheduler
[8] https://www.drupal.org/user/88338
[9] https://www.drupal.org/user/88338
[10] https://www.drupal.org/u/larowlan
[11] https://www.drupal.org/u/larowlan
[12] https://www.drupal.org/contact
[13] https://www.drupal.org/security-team
[14] https://www.drupal.org/writing-secure-code
[15] https://www.drupal.org/security/secure-configuration