[Security-news] SA-CONTRIB-2014-067 - Meta Tags Quick - Multiple vulnerabilities

security-news at drupal.org security-news at drupal.org
Wed Jul 2 21:37:41 UTC 2014


View online: https://www.drupal.org/node/2296511

   * Advisory ID: DRUPAL-SA-CONTRIB-2014-067
   * Project: Meta tags quick [1] (third-party module)
   * Version: 7.x
   * Date: 2014-July-02
   * Security risk: Moderately critical [2]
   * Exploitable from: Remote
   * Vulnerability: Cross Site Scripting, Open Redirect

-------- DESCRIPTION
---------------------------------------------------------

Meta tags quick adds meta tags editing to all non-administrative pages of
Drupal site.

.... Redirector abuse in path-based meta tag editing form

When editing a path-based meta tag, module does not check destination
parameter of the URL, allowing attacker to pass arbitrary URL to meta tag
editing form.

.... XSS in path-based meta tag editing form

It is possible to inject arbitrary Javascript via the module's Path-based
Metatags edit form that executes when a user attempts to delete a Path-based
Metatag.


Both vulnerabilities are mitigated by the fact that an attacker must have a
role with the permission "Edit path based meta tags".


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * Meta tags quick 7.x-2.x versions from and including 7.x-2.1 to 7.x-2.7
     (7.x-1.x and 7.x-2.0 are not affected)

Drupal core is not affected. If you do not use the contributed Meta tags
quick [4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

If you use the Meta tags quick 7.x-2.x for Drupal 7, upgrade to Meta tags
quick  7.x-2.8 [5]

Also see the Meta tags quick [6] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Ubani Balogun [7]

-------- FIXED BY
------------------------------------------------------------

   * Valery Lourie [8] the module maintainer
   * Ubani Balogun [9]

-------- COORDINATED BY
------------------------------------------------------

   * Greg Knaddison [10] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [11].

Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and securing your site [14].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]


[1] http://drupal.org/project/metatags_quick
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/metatags_quick
[5] https://www.drupal.org/node/2295975
[6] http://drupal.org/project/metatags_quick
[7] https://www.drupal.org/user/2858707
[8] https://www.drupal.org/u/valthebald
[9] https://www.drupal.org/user/2858707
[10] https://www.drupal.org/user/36762
[11] http://drupal.org/contact
[12] http://drupal.org/security-team
[13] http://drupal.org/writing-secure-code
[14] http://drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity



More information about the Security-news mailing list