[Security-news] The Better Mega Menu - Moderately critical - Cross Site Scripting - SA-CONTRIB-2021-039
security-news at drupal.org
security-news at drupal.org
Wed Sep 22 18:06:45 UTC 2021
View online: https://www.drupal.org/sa-contrib-2021-039
Project: The Better Mega Menu [1]
Date: 2021-September-22
Security risk: *Moderately critical* 13∕25
AC:Complex/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross Site Scripting
Description:
This module provides an admin interface for creating drop down menus that
combine Drupal menu items with rich media content.
It does not sufficiently sanitize user input such that an admin with
permissions to edit a menu may be able to exploit one or more
Cross-Site-Scripting (XSS) vulnerabilities.
This vulnerability is mitigated by the fact that an attacker must have
permission to administer mega menus and/or create or edit menu links, to
inject the XSS.
Solution:
Install the latest version:
* If you use the TB Mega Menu module for Drupal 8.x, upgrade to TB MegaMenu
8.x-1.4 [3]
Reported By:
* Patrick Fey [4]
Fixed By:
* Patrick Fey [5]
* Wade Stewart [6]
* Greg Knaddison [7] of the Drupal Security Team
* Chris Panza [8]
* knaffles [9]
Coordinated By:
* Damien McKenna [10] of the Drupal Security Team
* Greg Knaddison [11] of the Drupal Security Team
[1] https://www.drupal.org/project/tb_megamenu
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/tb_megamenu/releases/8.x-1.4
[4] https://www.drupal.org/user/998680
[5] https://www.drupal.org/user/998680
[6] https://www.drupal.org/user/3190381
[7] https://www.drupal.org/user/36762
[8] https://www.drupal.org/user/1215854
[9] https://www.drupal.org/user/1140512
[10] https://www.drupal.org/u/damienmckenna
[11] https://www.drupal.org/u/greggles
More information about the Security-news
mailing list