Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2015-090
HistoryApr 01, 2015 - 12:00 a.m.

Password Policy - Critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-090

2015-04-0100:00:00
Drupal Security Team
www.drupal.org
8

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.967

Percentile

99.7%

The Password Policy module allows enforcing restrictions on user passwords by defining password policies.

The module doesn’t sufficiently sanitize usernames in some administration pages, thereby exposing a Cross Site Scripting vulnerability.

This vulnerability is mitigated by the fact that only sites with a policy that uses the username constraint are affected. Also, only sites importing users from an external source (like distributed authentication) may allow non-standard usernames that might contain malicious characters, as Drupal core has validation when creating users via the user interface.

CVE identifier(s) issued

  • CVE-2015-4387

Versions affected

  • Password Policy 6.x-1.x versions prior to 6.x-1.11.
  • Password Policy 7.x-1.x versions prior to 7.x-1.11.

Drupal core is not affected. If you do not use the contributed Password policy module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Password Policy 6.x-1.x module for Drupal 6.x, upgrade to Password Policy 6.x-1.11
  • If you use the Password Policy 7.x-1.x module for Drupal 7.x, upgrade to Password Policy 7.x-1.11

Also see the Password policy project page.

Reported by

Fixed by

Coordinated by

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.967

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2015-090