Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1044 Drupal plugin Module Filter addresses XSS 29 March 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Drupal Module Filter Publisher: Drupal Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Cross-site Scripting -- Existing Account Resolution: Patch/Upgrade Original Bulletin: https://www.drupal.org/sa-contrib-2019-042 - --------------------------BEGIN INCLUDED TEXT-------------------- Module Filter - Moderately critical - Cross site scripting - SA-CONTRIB-2019-042 Project: Module Filter Version: 7.x-2.x-dev Date: 2019-March-27 Security risk: Moderately critical 12/25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:Default Vulnerability: Cross site scripting Description: This module enables you to filter the list of modules on the admin modules page, and organizes packages into vertical tabs. The module doesn't sufficiently escape HTML under the scenario leading to a Cross Site Scripting (XSS) vulnerability. This vulnerability is mitigated by the fact that the attacker must have access to input filtered html that will be included on the modules administration page e.g. in a block (this configuration is not common). Further, the Module Filter vertical tabs setting must be enabled. Solution: Install the latest version: * If you use the Module Filter module for Drupal 7.x, upgrade to Module Filter 7.x-2.2 Also see the Module Filter project page. Reported By: * Yonatan Offek Fixed By: * greenSkin Coordinated By: * Greg Knaddison of the Drupal Security Team - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXJ1mPWaOgq3Tt24GAQiepw/+L4S6O4bGORP/qK/T53C7GmNVuxA6ChB/ rmGjwE87HUpzEnn1DQauTrFGHn/iblcWAgJyLZm/y8KyAzxb+z2fCFLrS7li2MxX DUCTriwjFaG8YwMsN6y2fEhbWTum1RJ88E9UWZPDfJZqFIY7q9KJ4DOhRT6sJ//C 1NP5/KplIr8/GC1sacTlEECJKSKZG177Jt7kvtHRdxf7RiaeKfRtYqWl9EqRCrCq 8cXs48cgQc/KHYiKqmESUcxxXKimAWEYto6GizcT1ONRdjNgVAdqubldelpvHVSE vx9xsJ7LBGJfUhFy5bS12WafxNkiBxEfL9Jd6sr+CmjcoTgCtDSualDijxO+2ohQ A7f9mu/yJ2aFAlVb7bPzmGng9Dj1A2og5uWEd5dClobqw4cRkiPLPfxP6YBl/g/L pfh8HJuRMW/UWoKB8vvha/n7+17YD+KH8B1yYtysafAHhPZZBgM42k+UCzIVDt+E /EtkRNzvKuMvT/BfdU1lVzMHpTQ62uYACx+ZuWAVb7kL31sXhG+glwQ+srC7lFmf e3ERhHcXfqo5bX6RDggQIhnHg0+7ZNVJs8yFhHQITUsK2s58xP/Mi9L0Tnlr+OfR e3Qhofev00KXhU+7VUYw9H2izGpuDLrVVwYE5wmJEjAWmR61vNVm5BNz4aylLxIe qfgSFha3TC4= =8GbH -----END PGP SIGNATURE-----