Advertisement






Drupal Tribune 6.x / 7.x Cross Site Scripting

CVE Category Price Severity
N/A CWE-79 N/A High
Author Risk Exploitation Type Date
N/A High Remote 2014-01-30
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2014010214

Below is a copy:

View online: https://drupal.org/node/2184845

   * Advisory ID: DRUPAL-SA-CONTRIB-2014-008
   * Project: Tribune [1] (third-party module)
   * Version: 6.x, 7.x
   * Date: 2014-January-29
   * Security risk: Highly critical [2]
   * Exploitable from: Remote
   * Vulnerability: Cross Site Scripting

-------- DESCRIPTION
---------------------------------------------------------

A tribune is a type of chatroom.

The module doesn't sufficiently filter user provided text from Tribune node
titles.

This vulnerability is mitigated by the fact that an attacker must have a role
with the permission to create a Tribune node.


-------- CVE IDENTIFIER(S) ISSUED
--------------------------------------------

   * /A CVE identifier [3] will be requested, and added upon issuance, in
     accordance with Drupal Security Team processes./

-------- VERSIONS AFFECTED
---------------------------------------------------

   * Tribune 6.x-1.x versions.
   * Tribune 7.x-3.x versions.

Drupal core is not affected. If you do not use the contributed Tribune [4]
module, there is nothing you need to do.

-------- SOLUTION
------------------------------------------------------------

Remove the module or otherwise mitigate the issue.

Also see the Tribune [5] project page.

-------- REPORTED BY
---------------------------------------------------------

   * Raynald Mirville [6]

-------- FIXED BY
------------------------------------------------------------

Not applicable.

-------- COORDINATED BY
------------------------------------------------------

   * Laurence Liss [7] provisional member of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION
----------------------------------------

The Drupal security team can be reached at security at drupal.org or via the
contact form at http://drupal.org/contact [8].

Learn more about the Drupal Security team and their policies [9], writing
secure code for Drupal [10], and securing your site [11].

Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [12]


[1] http://drupal.org/project/tribune
[2] http://drupal.org/security-team/risk-levels
[3] http://cve.mitre.org/
[4] http://drupal.org/project/tribune
[5] http://drupal.org/project/tribune
[6] http://drupal.org/user/2737379
[7] http://drupal.org/user/724750
[8] http://drupal.org/contact
[9] http://drupal.org/security-team
[10] http://drupal.org/writing-secure-code
[11] http://drupal.org/security/secure-configuration
[12] https://twitter.com/drupalsecurity


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum