[Security-news] Client-side Hierarchical Select - Moderately critical - Cross-site scripting - SA-CONTRIB-2021-031

security-news at drupal.org security-news at drupal.org
Wed Sep 22 18:05:09 UTC 2021


View online: https://www.drupal.org/sa-contrib-2021-031

Project: Client-side Hierarchical Select [1]
Date: 2021-September-22
Security risk: *Moderately critical* 13∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross-site scripting

Description: 
The module provides a field widget for selecting taxonomy terms in a
hierarchical fashion.

The module doesn't sanitize user input in certain cases, leading to a
possible Cross-Site-Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role
with permission to create or edit taxonomy terms to which the widget may
apply.

Solution: 
Install the latest version:

   * If you use the cshs module for Drupal 8 or 9, upgrade to Client-side
     Hierarchical Select 8.x-3.5 [3].

Reported By: 
   * Patrick Fey [4]

Fixed By: 
   * Sergii Bondarenko [5]
   * Patrick Fey [6]

Coordinated By: 
   * Damien McKenna [7] of the Drupal Security Team
   * Greg Knaddison [8] of the Drupal Security Team


[1] https://www.drupal.org/project/cshs
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/cshs/releases/8.x-3.5
[4] https://www.drupal.org/user/998680
[5] https://www.drupal.org/user/2802285
[6] https://www.drupal.org/user/998680
[7] https://www.drupal.org/u/damienmckenna
[8] https://www.drupal.org/u/greggles



More information about the Security-news mailing list