Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2012-158
HistoryOct 24, 2012 - 12:00 a.m.

SA-CONTRIB-2012-158 - MailChimp - Cross Site Scripting (XSS)

2012-10-2400:00:00
Drupal Security Team
www.drupal.org
6

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

This module provides integration with the MailChimp email delivery service.

There are two issues with the webhook processing, which is exposed as an API in mailchimp.module and used by mailchimp_lists.module to update subscriber information.

  • The webhook URL key can be trivially calculated.
  • Webhook variables from POST requests are not properly sanitized.

Mitigating these issues is the fact that attackers cannot tamper with email subscriptions even if they know the webhook path, because changes are pulled in from the MailChimp API only.

CVE: CVE-2012-5551

Versions affected

  • MailChimp 7.x-2.x versions prior to 7.x-2.7.

Drupal core is not affected. If you do not use the contributed MailChimp module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the MailChimp module for Drupal 7.x, upgrade to MailChimp 7.x-2.7

Also see the MailChimp project page.

Reported by

Fixed by

Coordinated by

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2012-158