Project Security Advisories

Subscribe to Project Security Advisories feed
Updated: 2 hours 15 min ago

SA-CONTRIB-2015-051 - Term Queue - Cross Site Scripting (XSS)

Wed, 02/18/2015 - 11:11am
Description

Term Queue module allows you to create lists of taxonomy terms and display them in a block.

The module doesn't sufficiently sanitize user supplied text in some administration pages, thereby exposing a Cross Site Scripting vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer taxonomy".

CVE identifier(s) issued
  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
  • Term Queue 6.x-1.0

Drupal core is not affected. If you do not use the contributed Term Queue module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Term Queue project page.

Reported by Fixed by Coordinated by Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: Drupal 6.x

SA-CONTRIB-2015-050 - Services Basic Authentication - Access bypass

Wed, 02/18/2015 - 11:05am
Description

Services Basic Authentication module adds HTTP basic authentication for Services module.

A user could get unauthorized access to resources under some circumstances.

This vulnerability is mitigated by the fact that the authentication works correctly when page caching is disabled.

CVE identifier(s) issued
  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
  • Services Basic Auth 7.x-1.x versions prior to 7.x-1.3.

Drupal core is not affected. If you do not use the contributed Services Basic Authentication module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Services Basic Authentication project page.

Reported by Fixed by Coordinated by Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Edits to this advisory since publishing

Edited on March 3, 2015.

Drupal version: Drupal 7.x

SA-CONTRIB-2015-049 - Navigate - Cross Site Scripting (XSS)

Wed, 02/18/2015 - 10:24am
Description

Navigate is a customizable navigation bar for Drupal.

The module doesn't sufficiently sanitize user input when displaying the Navigate bar.

Because the vulnerability is a Reflected Cross Site Scripting, the only mitigating factor is that the victim must be tricked into visiting a specially crafted malicious url.

CVE identifier(s) issued
  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.
Versions affected
  • Navigate 6.x-1.x versions prior to 6.x-1.1.
  • Navigate 7.x-1.x versions prior to 7.x-1.1.

Drupal core is not affected. If you do not use the contributed Navigate module,
there is nothing you need to do.

Solution

Install the latest version:

Also see the Navigate project page.

Reported by Fixed by Coordinated by Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: Drupal 6.xDrupal 7.x

SA-CONTRIB-2015-048 - Avatar Uploader - Arbitrary PHP code execution

Wed, 02/18/2015 - 10:09am
Description

Avatar Uploader module provides an alternative way to upload user pictures.

The module doesn't sufficiently enforce file extensions when an avatar is uploaded, allowing users to bypass Drupal's normal file upload protections to install malicious HTML or executable code to the server.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "upload avatar file", and that the fix for SA-2006-006 - Drupal Core - Execution of arbitrary files in certain Apache configurations should prevent code execution in typical Apache configurations.

CVE identifier(s) issued
  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.
Versions affected
  • Avatar Uploader 6.x-1.x versions prior to 6.x-1.3.

Drupal core is not affected. If you do not use the contributed Avatar Uploader module,
there is nothing you need to do.

Solution

Install the latest version:

Also see the Avatar Uploader project page.

Reported by Fixed by Coordinated by Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: Drupal 7.x

SA-CONTRIB-2015-047 - Panopoly Magic - Cross Site Scripting (XSS)

Wed, 02/18/2015 - 10:08am
Description

This module enables live previews of Panels panes in the modal dialog for adding or editing them.

The module doesn't sufficiently filter the pane title when re-rendering the live preview.

This vulnerability is mitigated by the fact that an attacker must have permission to add or edit Panels panes.

CVE identifier(s) issued
  • A CVE identifier will be requested, and added upon issuance, in accordance
    with Drupal Security Team processes.
Versions affected
  • Panopoly Magic 7.x-1.x versions prior to 7.x-1.17.

Drupal core is not affected. If you do not use the contributed Panopoly Magic module,
there is nothing you need to do.

Solution

Install the latest version:

Also see the Panopoly Magic project page.

Reported by Fixed by Coordinated by Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: Drupal 7.x

Pages