what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Drupal 6.16 With Context 6.x-2.0-rc3 Cross Site Scripting

Drupal 6.16 With Context 6.x-2.0-rc3 Cross Site Scripting
Posted May 10, 2010
Authored by Justin C. Klein Keane

Drupal version 6.16 with Context 6.x-2.0-rc3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2010-1584
SHA-256 | 60da3e51c76210519e7e81f11c5f70fbb360bdfc9c1cc11b08f832b7508a79c7

Drupal 6.16 With Context 6.x-2.0-rc3 Cross Site Scripting

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Details of this disclosure may be found at:
http://www.madirish.net/?article=457

CVE-2010-1584

Description of Vulnerability:
- -----------------------------
Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL. The Drupal Context module
(http://drupal.org/project/context) "allows you to manage contextual
conditions and reactions for different portions of your site." The
Context module contains a cross site scripting (XSS) vulnerability
because it fails to sanitize block descriptions before display.

Systems affected:
- -----------------
Drupal 6.16 with Context 6.x-2.0-rc3 was tested and shown to be vulnerable.

Impact
- ------
User could inject arbitrary scripts into pages affecting site users.
This could result in administrative account compromise leading to web
server process compromise.

Mitigating factors:
- -------------------
In order to execute arbitrary script injection malicious users must have
'Administer blocks' permission.

Technical discussion and proof of concept:
- ------------------------------------------
Users with 'administer blocks' permission can insert arbitrary script in
block descriptions which is rendered by the Context module at
?q=admin/build/context/X where X is the block id.

Vendor Response:
- ----------------
Drupal security responds that they do not coordinate security fixes for
modules in release candidate designation. Vulnerability was reported to
the module maintainer via the public issue queue at the direction of
Drupal security.

- --
Justin C. Klein Keane
http://www.MadIrish.net

The digital signature on this message can be confirmed
using the public key at http://www.madirish.net/gpgkey
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/

iPwEAQECAAYFAkvoBWEACgkQkSlsbLsN1gAsZAb9GrhJSfSKKF4hM14iBIh8TKA0
ZYwv1RihbRVWyx8V+j0yUrFhQRqBZQe2FDiBvI1fnKbHCg8aulIZvPnCQfd98kkX
C/aAS5zNOtnAcD3cRq+Wk0Ly/Cbdv+sWatpewj/7JQqvSrilNsgwEksTtwi+27MM
4p5ndYMEwhk8jZZ/GgshfG4h4JU4eB1tLFF/Peu96OYZlTPVn8qh9ZzcbmjjOiMO
mGgqCNBuNZxfpGEp4xUdeLLJUEwa88D3M+b91RRn/z15ZQ2gy1WGnquPEWWhc5bd
nyZBm4OvkFoPMBp4jRY=
=nOaL
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close