View online: https://www.drupal.org/sa-contrib-2023-029
Project: TacJS [1] Date: 2023-June-28 Security risk: *Moderately critical* 13∕25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Cross site scripting
Description: This module enables sites to comply with the European cookie law using tarteaucitron.js.
The module doesn't sufficiently filter user-supplied text leading to a Cross Site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that an attacker needs additional permissions. The vulnerability can be exploited by an attacker with a role with the permission "administer tacjs" regardless of other configurations.
Solution: Install the latest version:
* If you use the tacjs alert module, upgrade to tacjs 8.x-6.4 [3]
Reported By: * Pierre Rudloff [4]
Fixed By: * Amine Boulaffas [5] * Frank Mably [6]
Coordinated By: * Damien McKenna [7] of the Drupal Security Team * Cathy Theys [8] of the Drupal Security Team * Greg Knaddison [9] of the Drupal Security Team
[1] https://www.drupal.org/project/tacjs [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/tacjs/releases/8.x-6.4 [4] https://www.drupal.org/user/3611858 [5] https://www.drupal.org/user/3584750 [6] https://www.drupal.org/user/3375160 [7] https://www.drupal.org/user/108450 [8] https://www.drupal.org/user/258568 [9] https://www.drupal.org/user/36762