[Security-news] DrupalChat - Critical - Multiple vulnerabilities - SA-CONTRIB-2017-057

security-news at drupal.org security-news at drupal.org
Wed Jul 12 16:59:37 UTC 2017


View online: https://www.drupal.org/node/2892404

   * Advisory ID: DRUPAL-SA-CONTRIB-2017-057
   * Project: DrupalChat [1]     (third-party module)
   * Version: 7.x
   * Date: 2017-July-05
   * Security risk: 16/25 ( Critical)
     AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
   * Vulnerability: Cross Site Scripting, Cross Site Request Forgery

-------- DESCRIPTION
---------------------------------------------------------

*UPDATE (2017-07-12)*: This SA originally recommended version 2.6, but it was
incorrectly tagged. We've updated the SA to recommend version 2.7. Sorry for
the confusion!

DrupalChat allows visitors of your Drupal site to chat with each other
privately or together in a public chatroom.

The module did not confirm the validity of a chat request, resulting in a
Cross Site Request Forgery (CSRF) vulnerability which enables an attacker to
trick a user to send arbitrary chat messages to any user. The

The module did not filter administrator provided text, leading to a Cross
Site Scripting (XSS) vulnerability.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * DrupalChat 7.x-2.x versions prior to 7.x-2.7.

Drupal core is not affected. If you do not use the contributed DrupalChat [4]
module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Install the latest version:

   * If you use the DrupalChat module for Drupal 7.x, upgrade to DrupalChat
     7.x-2.7 [5]

Also see the DrupalChat [6] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Elin Yordanov [7]

-------- FIXED BY
------------------------------------------------------------

   * Shashwat Srivastava [8] the module maintainer

-------- COORDINATED BY
------------------------------------------------------

   * Michael Hess [9] of the Drupal Security Team
   * Greg Knaddison [10] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [11].

Learn more about the Drupal Security team and their policies [12], writing
secure code for Drupal [13], and  securing your site [14].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [15]


[1] https://www.drupal.org/project/drupalchat
[2] https://www.drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] https://www.drupal.org/project/drupalchat
[5] https://www.drupal.org/project/drupalchat/releases/7.x-2.7
[6] https://www.drupal.org/project/drupalchat
[7] https://www.drupal.org/user/1274938
[8] https://www.drupal.org/u/darklrd
[9] https://www.drupal.org/u/mlhess
[10] https://www.drupal.org/u/greggles
[11] https://www.drupal.org/contact
[12] https://www.drupal.org/security-team
[13] https://www.drupal.org/writing-secure-code
[14] https://www.drupal.org/security/secure-configuration
[15] https://twitter.com/drupalsecurity



More information about the Security-news mailing list