Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2015-120
HistoryJun 17, 2015 - 12:00 a.m.

Inline Entity Form - Less critical - Cross Site Scripting (XSS) - SA-CONTRIB-2015-120

2015-06-1700:00:00
Drupal Security Team
www.drupal.org
6

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.967

Percentile

99.7%

The Inline Entity Form module provides a field widget for inline management (creation, modification, removal) of referenced entities.

The module doesn’t sufficiently sanitize user supplied text, thereby exposing a Cross Site Scripting vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with permission to create/edit fields.

CVE identifier(s) issued

  • CVE-2015-5507

Versions affected

  • Inline Entity Form 7.x-1.x versions prior to 7.x-1.6.

Drupal core is not affected. If you do not use the contributed Inline Entity Form module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Inline Entity Form project page.

Reported by

  • Matt Vance, provisional member of the Drupal Security Team

Fixed by

  • Matt Vance, provisional member of the Drupal Security Team

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.967

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2015-120