View online: https://drupal.org/node/2254925
* Advisory ID: DRUPAL-SA-CONTRIB-2014-047 * Project: Zen [1] (third-party theme) * Version: 7.x * Date: 2014-April-30 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting
-------- DESCRIPTION ---------------------------------------------------------
The Zen theme is a powerful, yet simple, HTML5 starting theme with a responsive, mobile-first grid design.
The theme does not properly sanitize theme settings before they are used in the output of a page. Custom themes that have copied Zen's template files (e.g. subthemes) may suffer from this same issue. If your theme creates variables in a preprocess using text from a custom theme setting, like this:
$variables['skip_link_text'] = theme_get_setting('skip_link_text');
you can prevent malicious XSS attacks by modifying the code to look like this:
$variables['skip_link_text'] = check_plain(theme_get_setting('skip_link_text'));
This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer theme".
-------- CVE IDENTIFIER(S) ISSUED --------------------------------------------
* /A CVE identifier [3] will be requested, and added upon issuance, in accordance with Drupal Security Team processes./
-------- VERSIONS AFFECTED ---------------------------------------------------
* Zen 7.x-5.x versions prior to 7.x-5.5. * Zen 7.x-3.x versions prior to 7.x-3.3.
Drupal core is not affected. If you do not use the contributed Zen [4] theme, there is nothing you need to do.
-------- SOLUTION ------------------------------------------------------------
Install the latest version:
* If you use the Zen theme for Drupal 7.x, upgrade to Zen 7.x-3.3 [5] or Zen 7.x-5.5 [6]
Also see the Zen [7] project page.
-------- REPORTED BY ---------------------------------------------------------
* Dennis Walgaard [8]
-------- FIXED BY ------------------------------------------------------------
* Dennis Walgaard [9] * John Albin Wilkins [10] the theme maintainer
-------- COORDINATED BY ------------------------------------------------------
* Greg Knaddison [11] of the Drupal Security Team
-------- CONTACT AND MORE INFORMATION ----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [12].
Learn more about the Drupal Security team and their policies [13], writing secure code for Drupal [14], and securing your site [15].
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity [16]
[1] http://drupal.org/project/zen [2] http://drupal.org/security-team/risk-levels [3] http://cve.mitre.org/ [4] http://drupal.org/project/zen [5] https://drupal.org/node/2254835 [6] https://drupal.org/node/2254837 [7] http://drupal.org/project/zen [8] https://drupal.org/user/883702 [9] https://drupal.org/user/883702 [10] http://drupal.org/user/32095 [11] http://drupal.org/user/36762 [12] http://drupal.org/contact [13] http://drupal.org/security-team [14] http://drupal.org/writing-secure-code [15] http://drupal.org/security/secure-configuration [16] https://twitter.com/drupalsecurity