View online: https://www.drupal.org/node/2300369
* Advisory ID: DRUPAL-SA-CONTRIB-2014-069 * Project: LoginToboggan [1] (third-party module) * Version: 7.x * Date: 2014-July-09 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Access bypass
-------- DESCRIPTION ---------------------------------------------------------
This module enables you to customise the standard Drupal registration and login processes.
-------- CROSS SITE SCRIPTING ------------------------------------------------
The module doesn't filter user-supplied information from the URL resulting in a reflected Cross Site Scripting (XSS) vulnerability. -------- ACCESS BYPASS -------------------------------------------------------
The module introduces a concept of a "pre-authorized role" which can have different permissions than the normal Drupal core authorized role. Logintoboggan usually removes permissions for a user if those permissions are in the "authorized user" role and not in the "pre-authorized role". The module failed to remove those permissions for users in a pre-authorized state on all "Page Not Found" (i.e. 404) pages.
This vulnerability is mitigated by the fact that a site must use the "pre-authorized role" feature and an attacker would only gain permissions available to authenticated users and would only gain them on 404 pages which do not show private information in a default Drupal installation.
-------- CVE IDENTIFIER(S) ISSUED --------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED ---------------------------------------------------
* Logintoboggan 7.x-1.x versions prior to 7.x-1.4
Drupal core is not affected. If you do not use the contributed LoginToboggan [4] module, there is nothing you need to do.
-------- SOLUTION ------------------------------------------------------------
Install the latest version:
* If you use the Logintoboggan module for Drupal 7.x, upgrade to Logintoboggan 7.x-1.4 [5]
Also see the LoginToboggan [6] project page.
-------- REPORTED BY ---------------------------------------------------------
* Mark Mahon [7] * Joel Walters [8]
-------- FIXED BY ------------------------------------------------------------
* Steve Cowie [9] the module maintainer * Dan Smith [10] of the Drupal Security Team * Joel Walters [11] * Mark Davies [12]
-------- COORDINATED BY ------------------------------------------------------
* Dan Smith [13] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION ----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [14].
Learn more about the Drupal Security team and their policies [15], writing secure code for Drupal [16], and securing your site [17].
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity [18]
[1] http://drupal.org/project/logintoboggan [2] http://drupal.org/security-team/risk-levels [3] http://cve.mitre.org/ [4] http://drupal.org/project/logintoboggan [5] https://www.drupal.org/node/2299467 [6] http://drupal.org/project/logintoboggan [7] https://www.drupal.org/user/1899214 [8] https://www.drupal.org/user/1052318 [9] https://www.drupal.org/user/110518 [10] https://www.drupal.org/user/241220 [11] https://www.drupal.org/user/1052318 [12] https://www.drupal.org/user/243300 [13] http://drupal.org/user/241220 [14] http://drupal.org/contact [15] http://drupal.org/security-team [16] http://drupal.org/writing-secure-code [17] http://drupal.org/security/secure-configuration [18] https://twitter.com/drupalsecurity