* Advisory ID: DRUPAL-SA-CONTRIB-2009-093 * Project: Temporary Invitation (third-party module) * Version: 5.x * Date: 2009 November 4 * Security risk: Less Critical * Exploitable from: Remote * Vulnerability: Cross Site Scripting
-------- DESCRIPTION ---------------------------------------------------------
The Temporary Invitation module enables site users to invite guests for a limited timespan. For each invitation, a new user is created, together with a login code (e.g. "EbN2F3") that the user can use to log in. The module fails to sanitize a value in Name field which is included in the invitation, leading to a Cross Site Scripting (XSS [1]) vulnerability. -------- VERSIONS AFFECTED ---------------------------------------------------
* Temporary Invitation module for Drupal 5.x prior to Temporary Invitation 5.x-2.3 [2]
Drupal core is not affected. If you do not use the contributed Temporary invitation module [3], there is nothing you need to do. -------- SOLUTION ------------------------------------------------------------
Upgrade to the latest version: * If you use Temporary Invitation module for Drupal 5.x upgrade to version 5.x-2.3 [4]
-------- REPORTED BY ---------------------------------------------------------
* Reported by Wolfgang Ziegler [5], the module maintainer.
-------- FIXED BY ------------------------------------------------------------
* Fixed by Wolfgang Ziegler [6], the module maintainer.
-------- CONTACT -------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting [2] http://drupal.org/node/623018 [3] http://drupal.org/project/temporary_invitation [4] http://drupal.org/node/623018 [5] http://drupal.org/user/16747 [6] http://drupal.org/user/16747