[Security-news] Client-side Hierarchical Select - Moderately critical - Cross-site scripting - SA-CONTRIB-2021-031
security-news at drupal.org
security-news at drupal.org
Wed Sep 22 18:05:09 UTC 2021
View online: https://www.drupal.org/sa-contrib-2021-031
Project: Client-side Hierarchical Select [1]
Date: 2021-September-22
Security risk: *Moderately critical* 13∕25
AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:Default [2]
Vulnerability: Cross-site scripting
Description:
The module provides a field widget for selecting taxonomy terms in a
hierarchical fashion.
The module doesn't sanitize user input in certain cases, leading to a
possible Cross-Site-Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that an attacker must have a role
with permission to create or edit taxonomy terms to which the widget may
apply.
Solution:
Install the latest version:
* If you use the cshs module for Drupal 8 or 9, upgrade to Client-side
Hierarchical Select 8.x-3.5 [3].
Reported By:
* Patrick Fey [4]
Fixed By:
* Sergii Bondarenko [5]
* Patrick Fey [6]
Coordinated By:
* Damien McKenna [7] of the Drupal Security Team
* Greg Knaddison [8] of the Drupal Security Team
[1] https://www.drupal.org/project/cshs
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/cshs/releases/8.x-3.5
[4] https://www.drupal.org/user/998680
[5] https://www.drupal.org/user/2802285
[6] https://www.drupal.org/user/998680
[7] https://www.drupal.org/u/damienmckenna
[8] https://www.drupal.org/u/greggles
More information about the Security-news
mailing list