exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Drupal 6.x Core XSS

Drupal 6.x Core XSS
Posted Dec 17, 2009
Authored by Justin C. Klein Keane

Drupal version 6.x suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 68a57fd6369c0d02fb9c9ec8ec3a180396e2f741d34e357f6d20abd61817b4f8

Drupal 6.x Core XSS

Change Mirror Download
The full text of this advisory can be found at
http://www.madirish.net/?article=442

Description of Vulnerability:
- - -----------------------------
Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL that provides extensibility through various third
party modules. The Locale module "Enables the translation of the user
interface to languages other than English." The Local module is one of the
Drupal core modules, distributed with every Drupal site, but not enabled by
default.

Systems affected:
- - -----------------
Drupal 6.14 was tested and shown to be vulnerable.

Impact:
- - -------
XSS vulnerabilities may expose site administrative accounts to compromise
which could lead to web server process compromise.

Mitigating factors:
- - -------------------
To carry out the XSS exploit below the attacker must have 'administer
languages' permissions.

Proof of Concept:
- ---------------------
1. Install Drupal 6.14 and enable the Locale module from Administer ->
Modules
2. Click Administer -> Site configuration -> Languages
3. Click 'Add language'
4. Expand the form area by clicking 'Custom language'
5. Enter "<script>alert('xss1');</script>" in the 'Language name in
English' text area
6. Enter "<script>alert('xss2');</script>" in the 'Native language name'
text area
7. Enter arbitrary values for 'Direction' and click the 'Add custom
language' button
8. Click Administer -> User management -> Users
9. Click the 'Add user' button to observe the rendered JavaScript

Technical details:
- ------------------------
The locale module fails to sanitize the output of the language name and
native language name before display. Applying the following patch fixes
this vulnerability.

Patch
- -------
Applying the following patch mitigates these threats.

--- modules/locale/locale.module 2009-02-25 06:47:37.000000000 -0500
+++ modules/locale/locale.module 2009-11-11 14:26:40.704648132 -0500
@@ -229,7 +229,7 @@ function locale_user($type, $edit, &$use
'#type' => (count($names) <= 5 ? 'radios' : 'select'),
'#title' => t('Language'),
'#default_value' => $user_preferred_language->language,
- '#options' => $names,
+ '#options' => array_map('filter_xss', $names),
'#description' => ($mode == LANGUAGE_NEGOTIATION_PATH) ? t("This
account's default language for e-mails, and preferred language for site
presentation.") : t("This account's default language for e-mails."),
);
return $form;

Vendor Response
---------------
Upgrade to the latest version.


--
Justin C. Klein Keane
http://www.MadIrish.net
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close