Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2012-044
HistoryMar 28, 2012 - 12:00 a.m.

SA-CONTRIB-2012-044 - Contact Forms - Cross Site Scripting

2012-03-2800:00:00
Drupal Security Team
www.drupal.org
5

2.1 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

44.8%

CVE: CVE-2012-2071

This module expands the features of the site wide contact form. It eliminates the drop down category menu by generating a clean looking contact form with a unique path, for each of the contact form categories.

The module doesn’t sufficiently filter user text of the page title and additional information, leading to a cross-site scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer site-wide contact form” and the core contact form needs to be enabled.

Versions affected

  • Contact forms 6.x-1.x versions prior to 6.x-1.13.

Drupal core is not affected. If you do not use the contributed Contact Forms module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Contact Forms module for Drupal 6.x, upgrade to 6.x-1.13

Also see the Contact Forms project page.

Reported by

Fixed by

Coordinated by

2.1 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

44.8%

Related for DRUPAL-SA-CONTRIB-2012-044