exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Drupal Custom Publishing Options 6.x XSS

Drupal Custom Publishing Options 6.x XSS
Posted Aug 15, 2012
Authored by Justin C. Klein Keane

Drupal version 6.22 with Custom Publishing Options version 6.x-1.4 suffers from a cross site scripting vulnerability. Proof of concept information included.

tags | exploit, xss, proof of concept
SHA-256 | 48dd91f8b89ca979ca8e11af83723a4ee087f9e15fcaa581b8d6f6470708cf67

Drupal Custom Publishing Options 6.x XSS

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Vulnerability Report

Reported: January 3, 2012
Author: Justin C. Klein Keane <justin@madirish.net>

Description of Vulnerability:
- -----------------------------
Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL. The Drupal Custom Publishing Options module
(https://drupal.org/project/custom_pub) contains a persistent cross
site scripting (XSS) vulnerability due to the fact that it fails to
sanitize format names before display.

Systems affected:
- -----------------
Drupal 6.22 with Custom Publishing Options 6.x-1.4 was tested and
shown to be vulnerable

Impact
- ------
User could inject arbitrary scripts into pages affecting site users.
This could result in administrative account compromise leading to web
server process compromise.

Mitigating factors:
- -------------------
In order to execute arbitrary script injection malicious users must
have 'Administer nodes' permission.

Proof of Concept:
- -----------------
1. Install and enable the Custom Publishing Options module
2. Add a new label at ?q=admin/content/custom_pub inserting arbitrary
HTML in the 'Publishing label' field.
3. Save the label to view the rendered script or view it on the
create content page for the appropriate content type.

Vendor response:
- ---------------
Upgrade to the latest version

- --
Justin C. Klein Keane
http://www.MadIrish.net

The PGP signature on this email can be verified using the public key at
http://www.madirish.net/gpgkey
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iPwEAQECAAYFAlAr7tQACgkQkSlsbLsN1gA+ogb/drMm08BCFHlfKg21hVHtoGjN
bKLX26wErcLfvsIlwfPvCQx3cme8BNoUA7pCyjmYAIQAZBnAlNvXA6fxz4aLuED5
I8zkwWFOYLKHXlsXYI2hnPuf4AVUFE3wPptqSTqONzE3GIWVyIolIOwmYxT1mi8P
7s3bWG/MpKE0owNDYzNkM5qjBULIgMzyX1SIIGkqde8UqZrIJLk0AbKeDtNLeJ5p
yb2WA8eIbkDUTPEPUpAu4fU43ki+dh0BN1b3Xqalrtel12ln1k62jORVqh07TGe/
wj9F9msw4R1wqHEZFlk=
=B/fi
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close