[Security-news] Doubleclick for Publishers (DFP) - Moderately Critical - Multiple vulnerabilities - SA-CONTRIB-2017-002

security-news at drupal.org security-news at drupal.org
Wed Jan 4 20:49:05 UTC 2017


View online: https://www.drupal.org/node/2841114

   * Advisory ID: DRUPAL-SA-CONTRIB-2017-002
   * Project: Doubleclick for Publishers (DFP) [1] (third-party module)
   * Version: 7.x
   * Date: 2017-January-04
   * Security risk: 10/25 ( Moderately Critical)
     AC:Complex/A:User/CI:None/II:None/E:Exploit/TD:All [2]
   * Vulnerability: Cross Site Scripting

-------- DESCRIPTION
---------------------------------------------------------

This module enables you to to place advertisements on your site that are
served by Google's DFP (Doubleclick for Publisher) service.

The module has multiple Cross Site Scripting (XSS) vulnerabilities due to not
sufficiently escaped fields. These vulnerabilities are mitigated by the fact
that an attacker must have a role with the permission "administer DFP".

The "administer DFP" permission is not marked as restricted.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * DFP 7.x-1.x versions prior to 7.x-1.5.

Drupal core is not affected. If you do not use the contributed Doubleclick
for Publishers (DFP) [4] module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the DFP module for Drupal 7.x, upgrade to Doubleclick for
     Publishers (DFP) 7.x-1.5 [5]

Also see the Doubleclick for Publishers (DFP) [6] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Alex Pott [7] of the Drupal Security Team

-------- FIXED BY
------------------------------------------------------------

   * Alex Pott [8] of the Drupal Security Team
   * Alexander Ross (bleen) [9] the module maintainer

-------- COORDINATED BY
------------------------------------------------------

   * Michael Hess [10] of the Drupal Security Team
   * Lee Rowlands [11] of the Drupal Security Team
   * Cash Williams [12] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [13].

Learn more about the Drupal Security team and their policies [14], writing
secure code for Drupal [15], and  securing your site [16].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [17]


[1] https://www.drupal.org/project/dfp
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/dfp
[5] https://www.drupal.org/project/dfp/releases/7.x-1.5
[6] https://www.drupal.org/project/dfp
[7] https://www.drupal.org/u/alexpott
[8] https://www.drupal.org/u/alexpott
[9] https://www.drupal.org/user/77375
[10] https://www.drupal.org/u/mlhess
[11] https://www.drupal.org/user/395439
[12] https://www.drupal.org/u/cashwilliams
[13] https://www.drupal.org/contact
[14] https://www.drupal.org/security-team
[15] https://www.drupal.org/writing-secure-code
[16] https://www.drupal.org/security/secure-configuration
[17] https://twitter.com/drupalsecurity



More information about the Security-news mailing list