[Security-news] SA-CONTRIB-2014-036 - Print - Cross Site Scripting

security-news at drupal.org security-news at drupal.org
Wed Apr 2 20:03:36 UTC 2014


View online: https://drupal.org/node/2231671

   * Advisory ID: DRUPAL-SA-CONTRIB-2014-036
   * Project: Printer, email and PDF versions [1] (third-party module)
   * Version: 6.x, 7.x
   * Date: 2014-April-02
   * Security risk: Moderately critical [2]
   * Exploitable from: Remote
   * Vulnerability: Cross Site Scripting

-------- DESCRIPTION
---------------------------------------------------------

This module provides printer-friendly versions of content, including send by
e-mail and PDF versions.
The module does not sufficiently sanitize user provided input when generating
the printed version of a node.
This is mitigated by the fact that an attacker must have permission to create
a node which offers the print functionality.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * Printer, email and PDF versions 6.x-1.x versions prior to 6.x-1.19.
   * Printer, email and PDF versions 7.x-1.x versions prior to 7.x-1.3.
   * Printer, email and PDF versions 7.x-2.x versions prior to 7.x-2.0.

Drupal core is not affected. If you do not use the contributed Printer, email
and PDF versions [4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the Printer, email and PDF versions module for Drupal 6.x,
     upgrade to print 6.x-1.19 [5]
   * If you use the Printer, email and PDF versions module for Drupal 7.x,
     upgrade to print 7.x-1.3 [6] or print 7.x-2.0 [7]

Also see the Printer, email and PDF versions [8] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Dinesh Waghmare [9]

-------- FIXED BY
------------------------------------------------------------

   * Dinesh Waghmare [10]
   * Cash Williams [11] provisional member of the Drupal Security Team
   * João Ventura [12] the module maintainer
   * Heine Deelstra [13] of the Drupal Security Team

-------- COORDINATED BY
------------------------------------------------------

   * Heine Deelstra [14] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [15].

Learn more about the Drupal Security team and their policies [16], writing
secure code for Drupal [17], and securing your site [18].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [19]


[1] http://drupal.org/project/print
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/print
[5] https://drupal.org/node/2231191
[6] https://drupal.org/node/2231197
[7] https://drupal.org/node/2231199
[8] http://drupal.org/project/print
[9] http://drupal.org/user/2279292
[10] http://drupal.org/user/2279292
[11] http://drupal.org/user/421070
[12] http://drupal.org/user/122464
[13] http://drupal.org/user/17943
[14] http://drupal.org/user/17943
[15] http://drupal.org/contact
[16] http://drupal.org/security-team
[17] http://drupal.org/writing-secure-code
[18] http://drupal.org/security/secure-configuration
[19] https://twitter.com/drupalsecurity



More information about the Security-news mailing list