[Security-news] SA-CONTRIB-2010-085 - Pathauto - Cross Site Scripting

security-news at drupal.org security-news at drupal.org
Wed Aug 11 21:09:11 UTC 2010


  * Advisory ID: DRUPAL-SA-CONTRIB-2010-085
  * Project: Pathauto (third-party module)
  * Version: 5.x, 6.x
  * Date: 2010-August-11
  * Security risk: Less critical
  * Exploitable from: Remote
  * Vulnerability: Cross Site Scripting

-------- DESCRIPTION  
---------------------------------------------------------

The Pathauto module automatically generates path aliases for various kinds of
content (nodes, categories, users) without requiring the user to manually
specify the path alias. It also provides additional tokens that can be used
in URL alias patterns and anywhere else that the Token API [1] is used. The
module does not sanitize the text in the [bookpathalias], [catalias], and
[termalias] tokens. Under rare circumstances those tokens could cause a Cross
Site Scripting (XSS [2]) vulnerability that may lead to a malicious user
gaining full administrative access. This vulnerability is mitigated by the
fact that a malicious user must have "create url aliases" permission and then
one of those tokens must be used to display output on an HTML page (for
instance, displaying a message to the user using an action from the
token_actions.module). The normal circumstance of using these tokens as part
of a Pathauto URL alias pattern is not vulnerable.
-------- VERSIONS AFFECTED  
---------------------------------------------------

  * Pathauto module for Drupal 5.x versions prior to 5.x-2.4
  * Pathauto module for Drupal 6.x versions prior to 6.x-1.4

Drupal core is not affected. If you do not use the contributed Pathauto [3]
module, there is nothing you need to do.
-------- SOLUTION  
------------------------------------------------------------

Install the latest version:
  * If you use the Pathauto module for Drupal 5.x upgrade to Pathauto 5.x-2.4
    [4]
  * If you use the Pathauto module for Drupal 6.x upgrade to Pathauto 6.x-1.4
    [5]

See also the Pathauto project page [6].
-------- SAFE USE OF TOKENS  
--------------------------------------------------

The existing [bookpathalias], [termalias], and [catalias] tokens are now
sanitized. New [bookpathalias-raw], [termalias-raw], and [catalias-raw]
companion tokens have been added for the un-sanitized versions of each token
respectfully. This is also a reminder to modules that use the Token API [7]
to display output on an HTML page (such as displaying a message to the user),
that no tokens with the -raw suffix should be used.
-------- REPORTED BY  
---------------------------------------------------------

  * Dave Reid [8] of the Drupal security team and module co-maintainer

-------- FIXED BY  
------------------------------------------------------------

  * Dave Reid [9] of the Drupal security team and module co-maintainer

-------- CONTACT  
-------------------------------------------------------------

The Drupal security team [10] can be reached at security at drupal.org or via
the form at http://drupal.org/contact.

[1] http://drupal.org/project/token
[2] http://en.wikipedia.org/wiki/Cross-site_scripting
[3] http://drupal.org/project/pathauto
[4] http://drupal.org/node/880462
[5] http://drupal.org/node/880464
[6] http://drupal.org/project/pathauto
[7] http://drupal.org/project/token
[8] http://drupal.org/user/53892
[9] http://drupal.org/user/53892
[10] http://drupal.org/security-team



More information about the Security-news mailing list