Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2015-078
HistoryMar 18, 2015 - 12:00 a.m.

SA-CONTRIB-2015-078 - Webform - Cross Site Scripting (XSS)

2015-03-1800:00:00
Drupal Security Team
www.drupal.org
6

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

EPSS

0.967

Percentile

99.7%

Webform is the module for making surveys, petitions, contests, personalized contact forms, and the like in Drupal.

The module doesn’t sufficiently sanitize component names when components are used to determine the e-mail addresses that may be sent upon webform submission.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to create/update nodes with an attached webform and (in 7.x-4.x releases) have the permission “edit webform components”.

CVE identifier(s) issued

  • CVE-2015-4374

Versions affected

  • Webform 6.x-3.x versions prior to 6.x-3.23
  • Webform 7.x-3.x versions prior to 7.x-3.23
  • Webform 7.x-4.x versions prior to 7.x-4.5

Drupal core is not affected. If you do not use the contributed Webform module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Webform module for Drupal 6.x, upgrade to Webform 6.x-3.23
  • If you use the Webform module for Drupal 7.x, upgrade to Webform 7.x-3.23 or Webform 7.x-4.5, as appropriate.

Also see the Webform project page.

Reported by

Fixed by

Coordinated by

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

EPSS

0.967

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2015-078