* Advisory ID: DRUPAL-SA-CONTRIB-2012-042 * Project: Wishlist Module [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-March-21 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting, Cross Site Request Forgery -------- DESCRIPTION --------------------------------------------------------- The Wishlist Module allows users to maintain shared wishlists for special events and holidays. Impact: The module doesn't sufficiently filter user supplied text from the URL. This can be used to perform a reflected cross site scripting (XSS) attack. User account credentials could be exposed or compromised, or users could be redirected to sites designed for phishing or hosting malware. This vulnerability is mitigated by the fact that users must be tricked into visiting a specific link and then manipulating the show/hide purchase details drop down. This drop down is only rendered if the user is viewing their own Wish List and the module is configured to hide the purchased status from them. -------- VERSIONS AFFECTED --------------------------------------------------- * Wishlist Module 6.x-2.x versions prior to 6.x-2.6. * Wishlist Module 7.x-2.x versions prior to 7.x-2.6. Drupal core is not affected. If you do not use the contributed Wishlist Module [3] module, there is nothing you need to do. -------- SOLUTION ------------------------------------------------------------ Install the latest version: * If you use the Wishlist module for Drupal 6.x, upgrade to Wishlist 6.x-2.6 [4] * If you use the Wishlist module for Drupal 7.x, upgrade to Wishlist 7.x-2.6 [5] See also the Wishlist Module [6] project page. -------- REPORTED BY --------------------------------------------------------- * Justin Klein Keane [7] -------- FIXED BY ------------------------------------------------------------ * Scott McLewin [8] the module maintainer -------- COORDINATED BY ------------------------------------------------------ * Greg Knaddison [9] of the Drupal Security Team -------- CONTACT AND MORE INFORMATION ---------------------------------------- The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact [10]. Learn more about the Drupal Security team and their policies [11], writing secure code for Drupal [12], and securing your site [13]. [1] http://drupal.org/project/wishlist [2] http://drupal.org/security-team/risk-levels [3] http://drupal.org/project/wishlist [4] http://drupal.org/node/1483634 [5] http://drupal.org/node/1483636 [6] http://drupal.org/project/wishlist [7] http://drupal.org/user/302225 [8] http://drupal.org/user/33718 [9] http://drupal.org/user/36762 [10] http://drupal.org/contact [11] http://drupal.org/security-team [12] http://drupal.org/writing-secure-code [13] http://drupal.org/security/secure-configuration _______________________________________________ Security-news mailing list Security-news@drupal.org http://lists.drupal.org/mailman/listinfo/security-news _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/