[Security-news] SA-CONTRIB-2010-097 - Imagemenu - Multiple vulnerabilities
security-news at drupal.org
security-news at drupal.org
Wed Sep 29 19:27:37 UTC 2010
* Advisory ID: DRUPAL-SA-CONTRIB-2010-097
* Project: Imagemenu (third-party module)
* Version: 5.x, 6.x
* Date: 2010-September-29
* Security risk: Less critical
* Exploitable from: Remote
* Vulnerability: Cross-Site Scripting, Cross-site Request Forgery
-------- DESCRIPTION
---------------------------------------------------------
The Imagemenu module allows users to create and maintain image based menus.
The Drupal 5 branch of this module contains a Cross Site Request Forgery
(CSRF [1]) vulnerability which could allow a malicious user to trick an
administrator into unintentionally enabling or disabling menu items provided
by this module.
The Drupal 6 branch of this module does not properly sanitize some
user-supplied menu and menu item properties, leading to Cross-Site Scripting
(XSS [2]) vulnerabilities. The risk is mitigated by the fact that the
"administer imagemenu" permission is required in order to exploit this
vulnerability.
-------- VERSIONS AFFECTED
---------------------------------------------------
* Imagemenu for Drupal 6 prior to 6.x-1.3
* Imagemenu for Drupal 5 prior to 5.x-1.2
Drupal core is not affected. If you do not use the contributed Imagemenu [3]
module, there is nothing you need to do.
-------- SOLUTION
------------------------------------------------------------
Install the latest version:
* If you use the Imagemenu module for Drupal 6.x upgrade to Imagemenu
6.x-1.3 [4]
* If you use the Imagemenu module for Drupal 5.x upgrade to Imagemenu
5.x-1.2 [5]
See also the Imagemenu [6] project page.
-------- REPORTED BY
---------------------------------------------------------
* The XSS vulnerability on menu titles was reported by Joachim Noreiko
(joachim [7])
* The XSS vulnerability on menu item description and the CSRF vulnerability
were reported by Ivo Van Geertruyen (mr.baileys [8]) of the Drupal
security team [9]
-------- FIXED BY
------------------------------------------------------------
* Paul Maddern (pobster [10]), module maintainer
* Ivo Van Geertruyen (mr.baileys [11]) of the Drupal security team [12]
-------- CONTACT
-------------------------------------------------------------
The Drupal security team [13] can be reached at security at drupal.org or via
the form at http://drupal.org/contact [14].
[1] http://en.wikipedia.org/wiki/Cross-site_request_forgery
[2] http://en.wikipedia.org/wiki/Cross-site_scripting
[3] http://drupal.org/project/imagemenu
[4] http://drupal.org/node/925726
[5] http://drupal.org/node/925730
[6] http://drupal.org/project/imagemenu
[7] http://drupal.org/user/107701
[8] http://drupal.org/user/383424
[9] http://drupal.org/security-team
[10] http://drupal.org/user/25159
[11] http://drupal.org/user/383424
[12] http://drupal.org/security-team
[13] http://drupal.org/security-team
[14] http://drupal.org/contact
More information about the Security-news
mailing list