what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

DRUPAL-SA-2005-007.txt

DRUPAL-SA-2005-007.txt
Posted Dec 3, 2005
Authored by Uwe Hermann | Site hermann-uwe.de

Drupal versions 4.5.0 through 4.5.5 and 4.6.0 through 4.6.3 suffer from cross site scripting flaws due to various quirks in interpretation of non-sensical attribute values.

tags | advisory, xss
SHA-256 | 38da2e32558d5e0702a8afa7f1fe5a808d08bed9886b36688f6b45d007ac9ff7

DRUPAL-SA-2005-007.txt

Change Mirror Download
----------------------------------------------------------------------------
Drupal security advisory DRUPAL-SA-2005-007
----------------------------------------------------------------------------
Advisory ID: DRUPAL-SA-2005-007
Project: Drupal core
Date: 2005-11-30
Security risk: less critical
Impact: normal
Where: from remote
Vulnerability: XSS
----------------------------------------------------------------------------

Description
-----------
Ahmed Saad has brought to our attention a creative way to enter malicious
HTML content. Upon further investigation we found that interpretation of
broken HTML/SGML and various quirks in interpretation of correctly formed,
but non-sensical attribute values by various browsers also allows entering
malicious HTML content. These can lead to XSS attacks.

XSS can lead to theft of accounts and services, user tracking,
misinformation...

Versions affected
-----------------
Drupal 4.5.0, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.5.5
Drupal 4.6.0, 4.6.1, 4.6.2, 4.6.3

Solution
--------
- If you are running Drupal 4.5.x, then upgrade to Drupal 4.5.6.
- If you are running Drupal 4.6.x, then upgrade to Drupal 4.6.4.

Important notes
---------------
We have developed a new XSS filtering system based on Ulf Harnhammar's kses
library http://sourceforge.net/projects/kses/ . This filtering only happens
for Filtered HTML content so if you are trusting a user to access the Full
HTML input format then said user can enter malicious content, so please
revise your input format settings.

Filtered HTML now filters the style attribute unconditionally.

And finally, filter writers can access this mechanism through the new
filter_xss() function.

Contact
-------
The security contact for Drupal can be reached at security at drupal.org
or using the form at http://drupal.org/contact.
More information is available from http://drupal.org/security or from
our security RSS feed http://drupal.org/security/rss.xml.


// Uwe Hermann, on behalf of the Drupal Security Team.
--
Uwe Hermann <uwe@hermann-uwe.de>
http://www.hermann-uwe.de | http://www.crazy-hacks.org
http://www.it-services-uh.de | http://www.phpmeat.org
http://www.unmaintained-free-software.org | http://www.holsham-traders.de
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close