[Security-news] SA-CONTRIB-2015-045 - Node Access Product - Cross Site Scripting (XSS) - Unsupported

security-news at drupal.org security-news at drupal.org
Wed Feb 11 19:06:48 UTC 2015


View online: https://www.drupal.org/node/2424349

   * Advisory ID: DRUPAL-SA-CONTRIB-2015-045
   * Project: Node access product [1]     (third-party module)
   * Version: 6.x, 7.x
   * Date: 2015-February-11
   * Security risk: 11/25 ( Moderately Critical)
     AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:All [2]
   * Vulnerability: Cross Site Scripting

-------- DESCRIPTION
---------------------------------------------------------

The Node Access Product module provides 'Node access' settings for product
nodes, whereby users who purchase the product are granted view access to
content, which can be predefined either by taxonomy, by node, or by Views.

The module doesn't sufficiently sanitize node titles leading to the
possibility of cross-site scripting by an attacker.

This vulnerability is mitigated by the fact that an attacker must have a role
with permission to create/edit content.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * All versions of Node Access Product

Drupal core is not affected. If you do not use the contributed Node Access
Product [4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

If you use the Node Access Product module you should uninstall it.

Also see the Node access product [5] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Pere Orga [6] of the Drupal Security Team

-------- FIXED BY
------------------------------------------------------------

   * Not applicable.

-------- COORDINATED BY
------------------------------------------------------

   * Rick Manelius [7] of the Drupal Security Team
   * Aaron Ott [8] provisional member of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [9].

Learn more about the Drupal Security team and their policies [10], writing
secure code for Drupal [11], and  securing your site [12].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [13]


[1] https://www.drupal.org/project/nap
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/nap
[5] https://www.drupal.org/project/nap
[6] https://www.drupal.org/user/2301194
[7] https://www.drupal.org/user/680072
[8] https://www.drupal.org/user/154069
[9] https://www.drupal.org/contact
[10] https://www.drupal.org/security-team
[11] https://www.drupal.org/writing-secure-code
[12] https://www.drupal.org/security/secure-configuration
[13] https://twitter.com/drupalsecurity



More information about the Security-news mailing list