Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 Dec 2010 00:24:31 +0300 (MSK)
From:      Eygene Ryabinkin <rea@FreeBSD.org>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/153474: [VuXML] security/vuxml: document XSS in www/drupal6-views
Message-ID:  <20101227212431.5554CDA81F@void.codelabs.ru>
Resent-Message-ID: <201012272130.oBRLUBla031006@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         153474
>Category:       ports
>Synopsis:       [VuXML] security/vuxml: document XSS in www/drupal6-views
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Mon Dec 27 21:30:11 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator:     Eygene Ryabinkin
>Release:        FreeBSD 9.0-CURRENT amd64
>Organization:
Code Labs
>Environment:

System: FreeBSD 9.0-CURRENT amd64

>Description:

Cross-site scripting vulnerability was found in Drupal-6.x views
plugin: [1].

>How-To-Repeat:

[1] http://drupal.org/node/999380

>Fix:

The following VuXML entry should be evaluated and added:
--- vuln.xml begins here ---
  <vuln vid="ff8b419a-0ffa-11e0-becc-0022156e8794">
    <topic>Drupal Views plugin -- cross-site scripting</topic>
    <affects>
      <package>
        <name>drupal6-views</name>
        <range><lt>2.12</lt></range>
      </package>
    </affects>
    <description>
      <body xmlns="http://www.w3.org/1999/xhtml">;
        <p>Drupal security team reports:</p>
        <blockquote
          cite="http://drupal.org/node/999380">;
          <p>The Views module provides a flexible method for Drupal site
          designers to control how lists and tables of content are
          presented. Under certain circumstances, Views could display
          parts of the page path without escaping, resulting in a
          relected Cross Site Scripting (XSS) vulnerability. An attacker
          could exploit this to gain full administrative access.</p>
          <p>Mitigating factors: This vulnerability only occurs with a
          specific combination of configuration options for a specific
          View, but this combination is used in the default Views
          provided by some additional modules. A malicious user would
          need to get an authenticated administrative user to visit a
          specially crafted URL.</p>
        </blockquote>
      </body>
    </description>
    <references>
      <cvename>CVE-2010-4521</cvename>
      <url>http://drupal.org/node/999380</url>;
    </references>
    <dates>
      <discovery>2010-12-15</discovery>
      <entry>TODAY</entry>
    </dates>
  </vuln>
--- vuln.xml ends here ---

Port upgrade to 2.12 is on the go (I am the maintainer).
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20101227212431.5554CDA81F>