[Security-news] Doubleclick for Publishers (DFP) - Moderately critical - Cross site scripting - SA-CONTRIB-2022-035

security-news at drupal.org security-news at drupal.org
Wed May 4 17:19:37 UTC 2022


View online: https://www.drupal.org/sa-contrib-2022-035

Project: Doubleclick for Publishers (DFP) [1]
Date: 2022-May-04
Security risk: *Moderately critical* 13∕25
AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Cross site scripting

Description: 
Doubleclick for Publishers (DFP) module enables a site to place ads from
Doubleclick For Publishers.

The module doesn't sanitize user input in certain cases, which leads to
Cross-Site-Scripting (XSS) vulnerabilities. An attacker that can create or
edit certain entities may be able to exploit a Cross-Site-Scripting (XSS)
vulnerability to target visitors of the site, including site admins with
privileged access.

This vulnerability is mitigated by the fact that an attacker must have a role
with the permission "administer DFP".

Solution: 
Install the latest version:

   * If you use the Doubleclick for Publishers module for Drupal 9.x, upgrade
     to DFP 8.x-1.2 [3]

Note that the Drupal 7 version of this module is unaffected.

Reported By: 
   * John Herreño [4]

Fixed By: 
   * John Herreño [5]
   * Marcelo Vani [6]

Coordinated By: 
   * Lee Rowlands [7] of the Drupal Security Team
   * Greg Knaddison [8] of the Drupal Security Team
   * Damien McKenna [9] of the Drupal Security Team


[1] https://www.drupal.org/project/dfp
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/dfp/releases/8.x-1.2
[4] https://www.drupal.org/user/350711
[5] https://www.drupal.org/user/350711
[6] https://www.drupal.org/user/854220
[7] https://www.drupal.org/user/395439
[8] https://www.drupal.org/user/36762
[9] https://www.drupal.org/user/108450



More information about the Security-news mailing list