Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2012-167
HistoryNov 28, 2012 - 12:00 a.m.

SA-CONTRIB-2012-167 - Mixpanel - Cross site scripting (XSS)

2012-11-2800:00:00
Drupal Security Team
www.drupal.org
8

2.1 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

This module provides integration with the Mixpanel real-time analytics service.

The module doesn’t sufficiently escape the Mixpanel token when adding the tracking Javascript to the page.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission “access administration pages”.

CVE: CVE-2012-5585

Versions affected

  • Mixpanel 6.x-1.x versions prior to 6.x-1.1.

Drupal core is not affected. If you do not use the contributed Mixpanel module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Mixpanel project page.

Reported by

Fixed by

Coordinated by

2.1 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2012-167