[Security-news] SA-CONTRIB-2010-097 - Imagemenu - Multiple vulnerabilities

security-news at drupal.org security-news at drupal.org
Wed Sep 29 19:27:37 UTC 2010


  * Advisory ID: DRUPAL-SA-CONTRIB-2010-097
  * Project: Imagemenu (third-party module)
  * Version: 5.x, 6.x
  * Date: 2010-September-29
  * Security risk: Less critical
  * Exploitable from: Remote
  * Vulnerability: Cross-Site Scripting, Cross-site Request Forgery

-------- DESCRIPTION  
---------------------------------------------------------

The Imagemenu module allows users to create and maintain image based menus.

The Drupal 5 branch of this module contains a Cross Site Request Forgery
(CSRF [1]) vulnerability which could allow a malicious user to trick an
administrator into unintentionally enabling or disabling menu items provided
by this module.

The Drupal 6 branch of this module does not properly sanitize some
user-supplied menu and menu item properties, leading to Cross-Site Scripting
(XSS [2]) vulnerabilities. The risk is mitigated by the fact that the
"administer imagemenu" permission is required in order to exploit this
vulnerability.

-------- VERSIONS AFFECTED  
---------------------------------------------------

  * Imagemenu for Drupal 6 prior to 6.x-1.3
  * Imagemenu for Drupal 5 prior to 5.x-1.2

Drupal core is not affected. If you do not use the contributed Imagemenu [3]
module, there is nothing you need to do.

-------- SOLUTION  
------------------------------------------------------------

Install the latest version:

  * If you use the Imagemenu module for Drupal 6.x upgrade to Imagemenu
    6.x-1.3 [4]
  * If you use the Imagemenu module for Drupal 5.x upgrade to Imagemenu
    5.x-1.2 [5]

See also the Imagemenu [6] project page.

-------- REPORTED BY  
---------------------------------------------------------

  * The XSS vulnerability on menu titles was reported by Joachim Noreiko
    (joachim [7])
  * The XSS vulnerability on menu item description and the CSRF vulnerability
    were reported by Ivo Van Geertruyen (mr.baileys [8]) of the Drupal
    security team [9]

-------- FIXED BY  
------------------------------------------------------------

  * Paul Maddern (pobster [10]), module maintainer
  * Ivo Van Geertruyen (mr.baileys [11]) of the Drupal security team [12]

-------- CONTACT  
-------------------------------------------------------------

The Drupal security team [13] can be reached at security at drupal.org or via
the form at http://drupal.org/contact [14].


[1] http://en.wikipedia.org/wiki/Cross-site_request_forgery
[2] http://en.wikipedia.org/wiki/Cross-site_scripting
[3] http://drupal.org/project/imagemenu
[4] http://drupal.org/node/925726
[5] http://drupal.org/node/925730
[6] http://drupal.org/project/imagemenu
[7] http://drupal.org/user/107701
[8] http://drupal.org/user/383424
[9] http://drupal.org/security-team
[10] http://drupal.org/user/25159
[11] http://drupal.org/user/383424
[12] http://drupal.org/security-team
[13] http://drupal.org/security-team
[14] http://drupal.org/contact



More information about the Security-news mailing list