[Security-news] SA-CONTRIB-2009-072 - RealName - Cross Site Scripting

security-news at drupal.org security-news at drupal.org
Wed Oct 14 22:12:49 UTC 2009


  * Advisory ID: DRUPAL-SA-CONTRIB-2009-072
  * Project: RealName (third-party module)
  * Version: 6.x
  * Date: 2009-October-14
  * Security risk: Moderately Critical
  * Exploitable from: Remote
  * Vulnerability: Cross Site Scripting

-------- DESCRIPTION  
---------------------------------------------------------

The RealName module allows the administrator to choose fields from the user
profile that will be used to add a "real name" element (method) to a user
object. In some specific cases, the module does not sanitize before
outputting the realname, resulting in a cross-site scripting (XSS [1])
vulnerability. Such an attack may lead to a malicious user gaining full
administrative access.
-------- VERSIONS AFFECTED  
---------------------------------------------------

  * RealName 6.x-1.x prior to 6.x-1.3

Drupal core is not affected. If you do not use the contributed RealName
module, there is nothing you need to do.
-------- SOLUTION  
------------------------------------------------------------

Install the latest version:
  * If you use the RealName for Drupal 6.x-1.x upgrade to RealName 6.x-1.3 [2]

See also the
RealName module project page
.
-------- REPORTED BY  
---------------------------------------------------------

mr.baileys [3]
-------- FIXED BY  
------------------------------------------------------------

NancyDru [4], the module maintainer
-------- CONTACT  
-------------------------------------------------------------

The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.

[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/603512
[3] http://drupal.org/user/383424
[4] http://drupal.org/user/101412



More information about the Security-news mailing list