[Security-news] SA-CONTRIB-2009-072 - RealName - Cross Site Scripting
security-news at drupal.org
security-news at drupal.org
Wed Oct 14 22:12:49 UTC 2009
* Advisory ID: DRUPAL-SA-CONTRIB-2009-072
* Project: RealName (third-party module)
* Version: 6.x
* Date: 2009-October-14
* Security risk: Moderately Critical
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
-------- DESCRIPTION
---------------------------------------------------------
The RealName module allows the administrator to choose fields from the user
profile that will be used to add a "real name" element (method) to a user
object. In some specific cases, the module does not sanitize before
outputting the realname, resulting in a cross-site scripting (XSS [1])
vulnerability. Such an attack may lead to a malicious user gaining full
administrative access.
-------- VERSIONS AFFECTED
---------------------------------------------------
* RealName 6.x-1.x prior to 6.x-1.3
Drupal core is not affected. If you do not use the contributed RealName
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the RealName for Drupal 6.x-1.x upgrade to RealName 6.x-1.3 [2]
See also the
RealName module project page
.
-------- REPORTED BY
---------------------------------------------------------
mr.baileys [3]
-------- FIXED BY
------------------------------------------------------------
NancyDru [4], the module maintainer
-------- CONTACT
-------------------------------------------------------------
The security team for Drupal can be reached at security at drupal.org or via
the form at http://drupal.org/contact.
[1] http://en.wikipedia.org/wiki/Cross-site_scripting
[2] http://drupal.org/node/603512
[3] http://drupal.org/user/383424
[4] http://drupal.org/user/101412
More information about the Security-news
mailing list