[Security-news] SA-CONTRIB-2014-059 - Touch Theme - Cross Site Scripting (XSS)

security-news at lists.drupal.org security-news at lists.drupal.org
Wed Jun 11 19:07:45 UTC 2014


View online: https://drupal.org/node/2284415

   * Advisory ID: DRUPAL-SA-CONTRIB-2014-059
   * Project: Touch [1] (third-party module)
   * Version: 7.x
   * Date: 2014-June-11
   * Security risk: Moderately critical [2]
   * Exploitable from: Remote
   * Vulnerability: Cross Site Scripting

-------- DESCRIPTION
---------------------------------------------------------

Touch Theme is a light weight theme with modern look and feel.

The theme does not sufficiently sanitize theme settings input for Twitter and
Facebook username.

This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "Administer themes".


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * Touch 7.x-1.x versions prior to 7.x-1.9.

Drupal core is not affected. If you do not use the contributed Touch [4]
module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the Touch theme for Drupal 7.x, upgrade to Touch 7.x-1.9 [5]

Also see the Touch [6] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Dennis Walgaard [7]

-------- FIXED BY
------------------------------------------------------------

   * Tom Kirkpatrick [8] provisional Drupal Security Team member

-------- COORDINATED BY
------------------------------------------------------

   * Tom Kirkpatrick [9] provisional Drupal Security Team member

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [10].

Learn more about the Drupal Security team and their policies [11], writing
secure code for Drupal [12], and securing your site [13].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [14]


[1] http://drupal.org/project/touch
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/touch
[5] https://drupal.org/node/2269483
[6] http://drupal.org/project/touch
[7] http://drupal.org/user/883702
[8] http://drupal.org/user/305669
[9] http://drupal.org/user/305669
[10] http://drupal.org/contact
[11] http://drupal.org/security-team
[12] http://drupal.org/writing-secure-code
[13] http://drupal.org/security/secure-configuration
[14] https://twitter.com/drupalsecurity



More information about the Security-news mailing list