View online: https://www.drupal.org/sa-contrib-2018-054
Project: Select (or other) [1] Date: 2018-July-25 Security risk: *Moderately critical* 14∕25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Cross Site Scripting
Description: This module enables users to select 'other' on certain form elements and a textfield appears for the user to provide a custom value.
The module doesn't sufficiently escape values of a text field the under the scenario when "Select or other" formatter is used.
This vulnerability is mitigated by the fact that an attacker must have access to edit a field that is displayed through the "Select or other" formatter.
Solution: * If you use the "Select or other" 7.x-2.x, upgrade to Select or other 7.x-2.24 [3] * If you use the "Select or other" 7.x-3.x, upgrade to Select or other 7.x-3.0-alpha3 [4]
Also see the Select (or other) [5] project page.
Reported By: * bucefal91 [6]
Fixed By: * Chris Jansen [7], the module maintainer
Coordinated By: * Michael Hess [8] of the Drupal Security Team
[1] https://www.drupal.org/project/select_or_other [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/select_or_other/releases/7.x-2.24 [4] https://www.drupal.org/project/select_or_other/releases/7.x-3.0-alpha3 [5] https://www.drupal.org/project/select_or_other [6] https://www.drupal.org/user/504128 [7] https://www.drupal.org/user/2480548 [8] https://www.drupal.org/u/mlhess