View online: https://www.drupal.org/sa-contrib-2019-028
Project: Context [1] Version: 7.x-3.x-dev Date: 2019-February-27 Security risk: *Moderately critical* 14∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Cross site scripting
Description: This module enables you to manage contextual conditions and reactions for different portions of your site.
The module doesn't sufficiently sanitize user output when displayed leading to a Cross Site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that an attacker must have the ability to store malicious markup in the site (e.g. permission to create a node with a field that accepts "filtered html").
Solution: Install the latest version:
* If you use the context module for Drupal 7.x, upgrade to context 7.x-3.10 [3]
Also see the Context [4] project page.
Reported By: * poiu [5]
Fixed By: * Bostjan Kovac [6]
Coordinated By: * Ivo Van Geertruyen [7] of the Drupal Security Team * Greg Knaddison [8] of the Drupal Security Team * Cash Williams [9] of the Drupal Security Team
[1] https://www.drupal.org/project/context [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/context/releases/7.x-3.10 [4] https://www.drupal.org/project/context [5] https://www.drupal.org/user/194009 [6] https://www.drupal.org/user/1773456 [7] https://www.drupal.org/user/383424 [8] https://www.drupal.org/user/36762 [9] https://www.drupal.org/user/29938