* Advisory ID: DRUPAL-SA-CONTRIB-2012-028 * Project: Hierarchical Select [1] (third-party module) * Version: 6.x * Date: 2012-February-29 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting -------- DESCRIPTION --------------------------------------------------------- The Hierarchical Select module provides a "hierarchical_select" form element, which is a greatly enhanced way for letting the user select items in a taxonomy. The module does not sanitize some of the user-supplied data before displaying it, leading to a Cross Site Scripting (XSS [3]) vulnerability that may lead to a malicious user gaining full administrative access. This vulnerability is mitigated by the fact that the attacker must have a role with the 'administer taxonomy' permission; specifically he must be able to create or modify vocabularies and then modify the vocabulary's help text. -------- VERSIONS AFFECTED --------------------------------------------------- * Hierarchical Select 6.x-3.x versions prior to 6.x-3.7. Drupal core is not affected. If you do not use the contributed Hierarchical Select [4] module, there is nothing you need to do. -------- SOLUTION ------------------------------------------------------------ Install the latest version: * If you use the Hierarchical Select module for Drupal 6.x, upgrade to Hierarchical Select 6.x-3.8 [5] See also the Hierarchical Select [6] project page. -------- REPORTED BY --------------------------------------------------------- * Sam Oldak [7] * Wim Leers [8] the module maintainer -------- FIXED BY ------------------------------------------------------------ * Wim Leers [9] the module maintainer -------- COORDINATED BY ------------------------------------------------------ * Stéphane Corlosquet [10] of the Drupal Security Team -------- CONTACT AND MORE INFORMATION ---------------------------------------- The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [11]. Learn more about the Drupal Security team and their policies [12], writing secure code for Drupal [13], and securing your site [14]. [1] http://drupal.org/project/hierarchical_select [2] http://drupal.org/security-team/risk-levels [3] http://en.wikipedia.org/wiki/Cross-site_scripting [4] http://drupal.org/project/hierarchical_select [5] http://drupal.org/node/1461318 [6] http://drupal.org/project/hierarchical_select [7] http://drupal.org/user/366337 [8] http://drupal.org/user/99777 [9] http://drupal.org/user/99777 [10] http://drupal.org/user/52142 [11] http://drupal.org/contact [12] http://drupal.org/security-team [13] http://drupal.org/writing-secure-code [14] http://drupal.org/security/secure-configuration _______________________________________________ Security-news mailing list Security-news@drupal.org http://lists.drupal.org/mailman/listinfo/security-news _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/