* Advisory ID: DRUPAL-SA-CONTRIB-2009-025
* Project: Fivestar (third-party module)
* Version: 5.x, 6.x
* Date: 2009-April-29
* Security risk: Not critical
* Exploitable from: Remote
* Vulnerability: Cross-site request forgery
-------- DESCRIPTION
---------------------------------------------------------
The Fivestar module provides a voting widget for content and records votes
using Ajax. The URL used by the javascript to register votes is vulnerable to
cross-site request forgeries (CSRF [1]) making it possible for users to
unknowingly vote for content.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Fivestar 5.x-1.x prior to 5.x-1.14
* Fivestar 6.x-1.x prior to 6.x-1.14
Drupal core is not affected. If you do not use the contributed Fivestar
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Fivestar 5.x-1.x upgrade to Fivestar 5.x-1.14 [2]
* If you use Fivestar 6.x-1.x upgrade to Fivestar 6.x-1.14 [3]
See also the Fivestar project page [4].
-------- REPORTED BY
---------------------------------------------------------
John Morahan [5] of the Drupal security team.
-------- FIXED BY
------------------------------------------------------------
Nate Haug (quicksketch) [6] and Moshe Weitzman [7].
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Csrf
[2] http://drupal.org/node/449028
[3] http://drupal.org/node/449026
[4] http://drupal.org/project/fivestar
[5] http://drupal.org/user/58170
[6] http://drupal.org/user/35821
[7] http://drupal.org/user/23
* Advisory ID: DRUPAL-SA-CONTRIB-2009-024
* Project: Node Access User Reference (third-party module)
* Version: 5.x, 6.x
* Date: 2009-April-29
* Security risk: Critical
* Exploitable from: Remote
* Vulnerability: Access bypass
-------- DESCRIPTION
---------------------------------------------------------
Node Access User Reference enables administrators to automatically grant node
access (view, update, or delete) to a node where the user is referenced by
CCK user reference. When such a field is saved with an empty value, Node
Access User Reference mistakes this for a reference to the anonymous user,
and allows non logged in visitors to view or author the node in question.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Node Access User Reference 5.x prior to 5.x-2.0-beta4
* Node Access User Reference 6.x prior to 6.x-2.0-beta6
Drupal core is not affected. If you do not use the contributed Node Access
User Reference module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Node Access User Reference 5.x upgrade to Node Access User
Reference 5.x-2.0-beta4 [1].
* If you use Node Access User Reference 6.x upgrade to Node Access User
Reference 5.x-2.0-beta4 [2].
See also the Node Access User Reference project page [3].
-------- REPORTED BY
---------------------------------------------------------
Jakub Suchy [4] of the Drupal security team and Bob Geiger [5].
-------- FIXED BY
------------------------------------------------------------
Daniel Braksator [6].
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://drupal.org/node/448390
[2] http://drupal.org/node/448392
[3] http://drupal.org/project/nodeaccess_userreference
[4] http://drupal.org/user/31977
[5] http://drupal.org/user/380770
[6] http://drupal.org/user/134005
* Advisory ID: DRUPAL-SA-CONTRIB-2009-023
* Project: News Page
* Versions: 5.x
* Date: 2009-April-29
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: SQL injection
-------- DESCRIPTION
---------------------------------------------------------
The News Page module provides a node content type which displays feed items
from an aggregator category, filtered by keywords entered into the 'Include
Words' field of the node. Unfortunately the News Page module uses keywords
directly in SQL queries without being sanitized, allowing SQL injection
attacks [1] by malicious users who have access to create and edit News Page
nodes.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Versions of News Page for Drupal 5.x prior to 5.x-1.2
Drupal core is not affected. If you do not use the News Page module, there is
nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version.
* If you use News Page for Drupal 5.x upgrade to 5.x-1.2 [2]
Also see the News Page project page [3].
-------- REPORTED BY
---------------------------------------------------------
Robert Castelo (Robert Castelo [4])
-------- FIXED BY
------------------------------------------------------------
Robert Castelo (Robert Castelo [5])
-------- CONTACT
-------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact and by selecting the security
issues category.
[1] http://en.wikipedia.org/wiki/SQL_injection
[2] http://drupal.org/node/448988
[3] http://drupal.org/project/news_page
[4] http://drupal.org/user/3555
[5] http://drupal.org/user/3555
* Advisory ID: DRUPAL-SA-CONTRIB-2009-0xx
* Project: Exif (third-party module)
* Version: 5.x, 6.x
* Date: 2009-April-29
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: Cross-site scripting
-------- DESCRIPTION
---------------------------------------------------------
The Exif module enables users to display EXIF tags in images on the site.
EXIF tags are not properly filtered for HTML input, allowing users with
permission to upload images to inject arbitrary code into the site using a
specially crafted image. Such a cross site scripting [1] (XSS) attack may
lead to a malicious user gaining full administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Exif 5.x-1.x prior to 5.x-1.2
* Exif 6.x-1.x-dev prior to April 13, 2009
Drupal core is not affected. If you do not use the contributed Exif module,
there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Exif 5.x-1.x upgrade to Exif 5.x-1.2 [2].
* Although development versions are not supported, a fix is available; If
you use Exif 6.x-1.x-dev prior to April 13, 2009, upgrade to latest Exif
6.x-1.x-dev [3].
See also the Exif project page [4].
-------- REPORTED BY
---------------------------------------------------------
Jakub Suchy [5] of the Drupal security team and Michael Hess [6].
-------- FIXED BY
------------------------------------------------------------
James Gilliland [7] and rapsli [8].
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/448862
[3] http://drupal.org/node/363274
[4] http://drupal.org/project/exif
[5] http://drupal.org/user/31977
[6] http://drupal.org/user/102818
[7] http://drupal.org/user/48673
[8] http://drupal.org/user/140802
* Advisory ID: DRUPAL-SA-CONTRIB-2009-021
* Project: CCK comment reference (third-party module)
* Version: 6.x
* Date: 2009 April 15
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: Cross-site scripting (XSS)
-------- DESCRIPTION
---------------------------------------------------------
CCK comment reference project, lets administrators define node fields that
are references to comments. When displaying a node edit form, the titles of
candidate referenced comments are not properly filtered, allowing malicious
users to inject arbitrary code on those pages. Such a cross site scripting
[1] (XSS) attack may lead to a malicious user gaining full administrative
access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Versions of CCK comment reference for Drupal 6.x prior to 6.x-1.2
Drupal core is not affected. If you do not use the CCK comment reference
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use CCK comment reference for Drupal 6.x upgrade to CCK comment
reference 6.x-1.2 [2]
See also the CCK comment reference project page [3].
-------- REPORTED BY
---------------------------------------------------------
Kristof De Jaeger (swentel [4]).
-------- FIXED BY
------------------------------------------------------------
Kristof De Jaeger (swentel [5]).
-------- CONTACT
-------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/434842
[3] http://drupal.org/project/commentreference
[4] http://drupal.org/user/107403
[5] http://drupal.org/user/107403
* Advisory ID: DRUPAL-SA-CONTRIB-2009-020
* Project: Printer, e-mail and PDF versions (third-party module)
* Version: 5.x, 6.x
* Date: 2009-April-15
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: Cross-site scripting (XSS)
-------- DESCRIPTION ---------------------------------------------------------
The Printer, e-mail and PDF versions ("Print") module provides
printer-friendly versions of content. The module does not correctly escape
content titles, enabling malicious users to insert arbitrary HTML and scripts
into certain pages. Such a cross site scripting [1] (XSS) attack against
sufficiently privileged users may lead to administrator access to the site.
-------- VERSIONS AFFECTED ---------------------------------------------------
* Versions of Printer, e-mail and PDF versions for Drupal 5.x prior to
5.x-4.5
* Versions of Printer, e-mail and PDF versions for Drupal 6.x prior to
6.x-1.5
Drupal core is not affected. If you do not use the contributed Printer,
e-mail and PDF versions module, there is nothing you need to do.
-------- SOLUTION ------------------------------------------------------------
Install the latest version:
* If you use Printer, e-mail and PDF versions for Drupal 5.x upgrade to
Printer, e-mail and PDF versions 5.x-4.5 [2]
* If you use Printer, e-mail and PDF versions for Drupal 5.x upgrade to
Printer, e-mail and PDF versions 6.x-1.5 [3]
See also the Printer, e-mail and PDF versions project page [4].
-------- REPORTED BY ---------------------------------------------------------
Stéphane Corlosquet [5]
-------- FIXED BY ------------------------------------------------------------
Peter Wolanin [6]
-------- CONTACT -------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact [7].
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/434718
[3] http://drupal.org/node/434720
[4] http://drupal.org/project/print
[5] http://drupal.org/user/52142
[6] http://drupal.org/user/49851
[7] http://drupal.org/contact
* Advisory ID: DRUPAL-SA-CONTRIB-2009-019
* Project: Localization client (third-party module)
* Versions: 5.x, 6.x
* Date: 2009-April-15
* Security risk: Moderately critical
* Exploitable from: Remote
* Vulnerability: Cross-site scripting (XSS)
-------- DESCRIPTION ---------------------------------------------------------
The Localization client module allows you to translate the interface of your
Drupal site from within each page as you go. When displaying translatable
strings and their completed translations, the module does not escape the
data. If used to translate the Drupal core interface, this is not a problem,
since no user input is involved. However, when used with modules such as the
Internationalization module suite or Views, user provided data is translated,
making the module vulnerable to cross site scripting [1] (XSS). This enables
malicious users to insert arbitrary HTML and scripts into certain pages. Such
an attack against sufficiently privileged users may lead to adminstrator
access to the site.
-------- VERSIONS AFFECTED ---------------------------------------------------
* Versions of Localization client for Drupal 5.x prior to 5.x-1.2
* Versions of Localization client for Drupal 6.x prior to 6.x-1.7
Drupal core is not affected. If you do not use the Localization client
module, there is nothing you need to do.
-------- SOLUTION ------------------------------------------------------------
Install the latest version.
* If you use Localization client on Drupal 5, upgrade to Localization client
5.x-1.2 [2]
* If you use Localization client on Drupal 6, upgrade to Localization client
6.x-1.7 [3]
-------- REPORTED BY ---------------------------------------------------------
Grégoire Moreau
-------- FIXED BY ------------------------------------------------------------
Roger Lopez, Alexander Hass, Bálint Csuthy, Jose A. Reyero and Gábor Hojtsy
-------- CONTACT -------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact [4] and by selecting the security
issues category.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/434694
[3] http://drupal.org/node/434688
[4] http://drupal.org/contact
* Advisory ID: DRUPAL-SA-CONTRIB-2009-018
* Project: Feed element mapper (third-party module)
* Version: 5.x
* Date: 2009-March-26
* Security risk: Less critical
* Exploitable from: Remote
* Vulnerability: Cross-site scripting (XSS)
-------- DESCRIPTION ---------------------------------------------------------
Feed element mapper is an Add-on module for FeedAPI that maps elements on a
feed item such as tags or the author name to taxonomy or CCK fields. These
mappings are configurable by point and click. The module doesn't correctly
escape content titles enabling malicious users to insert arbitrary HTML and
scripts into certain pages. Such a cross site scripting [1] (XSS) attack
against sufficiently privileged users may lead to adminstrator access to the
site.
-------- VERSIONS AFFECTED ---------------------------------------------------
* Versions of Feed element mapper for Drupal 5.x prior to 5.x-1.1
Drupal core is not affected. If you do not use the contributed Feed element
mapper module, there is nothing you need to do.
-------- SOLUTION ------------------------------------------------------------
Install the latest version:
* If you use Feed element mapper for Drupal 5.x upgrade to Feed element
mapper 5.x-1.1 [2]
If you use one of the unsupported Feed element mapper 6.x-1.0 beta versions,
upgrade to Feed element mapper 6.x-1.0-beta5 [3].
See also the Feed element mapper project page [4].
-------- REPORTED BY ---------------------------------------------------------
James Gilliand [5]
-------- FIXED BY ------------------------------------------------------------
Alex Barth [6]
-------- CONTACT -------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact [7].
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/414644
[3] http://drupal.org/node/414640
[4] http://drupal.org/project/feedapi_mapper
[5] http://drupal.org/user/48673
[6] http://drupal.org/user/53995
[7] http://drupal.org/contact
* Advisory ID: DRUPAL-SA-CONTRIB-2009-017
* Project: Vote Up/Down (third-party module)
* Version: 5.x, 6.x
* Date: 2009-March-25
* Security risk: Not critical
* Exploitable from: Remote
* Vulnerability: Cross-site request forgery
-------- DESCRIPTION
---------------------------------------------------------
The Vote Up/Down module provides a voting widget for content that records
votes using Ajax. The URL for voting is vulnerable to cross-site request
forgeries (CSRF [1]) making it possible for users to unknowingly vote for
content.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Vote Up/Down 5.x-1.x prior to 5.x-1.1
* Vote Up/Down 6.x-1.x prior to 6.x-1.0-beta4
Drupal core is not affected. If you do not use the contributed Vote Up/Down
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Vote Up/Down 5.x-1.x upgrade to Vote Up/Down 5.x-1.1 [2]
* If you use Vote Up/Down 6.x-1.x upgrade to Vote Up/Down 6.x-1.0-beta4 [3]
See also the Vote Up/Down project page [4].
-------- REPORTED BY
---------------------------------------------------------
Alexandr Shvets [5].
-------- FIXED BY
------------------------------------------------------------
Pratul Kalia [6].
-------- CONTACT
-------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Csrf
[2] http://drupal.org/node/413818
[3] http://drupal.org/node/413896
[4] http://drupal.org/project/vote_up_down
[5] http://drupal.org/user/233667
[6] http://drupal.org/user/162357
* Advisory ID: DRUPAL-SA-CONTRIB-2009-016
* Project: Wikitools (third-party module)
* Version: 5.x, 6.x
* Date: 2009-March-25
* Security risk: Less critical
* Exploitable from: Remote
* Vulnerability: Cross-site scripting
-------- DESCRIPTION
---------------------------------------------------------
The Wikitools module provides several options to get a more wiki-like
behavior for Drupal. On several pages, the Wikitools module prints out a
parameter without escaping it. Malicious users are thus able to execute a
cross site scripting [1] (XSS) attack when they entice users to visit a
specifically crafted URL. This may lead to a malicious user gaining full
administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Wikitools 5.x-1.x prior to 5.x-1.3
* Wikitools 6.x-1.x prior to 6.x-1.1
Drupal core is not affected. If you do not use the contributed Wikitools
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use Wikitools 5.x-1.x upgrade to Wikitools 5.x-1.3 [2]
* If you use Wikitools 6.x-1.x upgrade to Wikitools 6.x-1.1 [3]
See also the Wikitools project page [4].
-------- REPORTED BY
---------------------------------------------------------
Charlie Gordon [5] of the Drupal Security Team [6].
-------- FIXED BY
------------------------------------------------------------
Charlie Gordon [7] of the Drupal Security Team [8].
-------- CONTACT
-------------------------------------------------------------
The security contact for Drupal can be reached at security at drupal.org or
via the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/413754
[3] http://drupal.org/node/413750
[4] http://drupal.org/project/wikitools
[5] http://drupal.org/user/157412
[6] http://drupal.org/security-team
[7] http://drupal.org/user/157412
[8] http://drupal.org/security-team