ID CVE-2008-0273 Type cve Reporter cve@mitre.org Modified 2017-08-08T01:29:00
Description
Interpretation conflict in Drupal 4.7.x before 4.7.11 and 5.x before 5.6, when Internet Explorer 6 is used, allows remote attackers to conduct cross-site scripting (XSS) attacks via invalid UTF-8 byte sequences, which are not processed as UTF-8 by Drupal's HTML filtering, but are processed as UTF-8 by Internet Explorer, effectively removing characters from the document and defeating the HTML protection mechanism.
{"freebsd": [{"lastseen": "2019-05-29T18:34:29", "bulletinFamily": "unix", "description": "\nThe Drupal Project reports:\n\nWhen outputting plaintext Drupal strips potentially dangerous\n\t HTML tags and attributes from HTML, and escapes characters which\n\t have a special meaning in HTML. This output filtering secures\n\t the site against cross site scripting attacks via user input.\nCertain byte sequences that are invalid in the UTF8\n\t specification are not handled properly by Internet Explorer 6\n\t and may lead it to see a multibyte start character where none is\n\t present. Internet Explorer 6 then consumes a number of\n\t subsequent UTF-8 characters. This may lead to unsafe attributes\n\t that were outside a tag for the filter to appear inside a tag\n\t for Internet Explorer 6. This behaviour can then be used to\n\t insert and execute javascript in the context of the website.\n\n", "modified": "2010-05-12T00:00:00", "published": "2008-01-10T00:00:00", "id": "6F736456-C060-11DC-982E-001372FD0AF2", "href": "https://vuxml.freebsd.org/freebsd/6f736456-c060-11dc-982e-001372fd0af2.html", "title": "drupal -- cross site scripting (utf8)", "type": "freebsd", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "openvas": [{"lastseen": "2017-07-02T21:10:19", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-09-16T00:00:00", "published": "2008-09-04T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=60161", "id": "OPENVAS:60161", "title": "FreeBSD Ports: drupal5", "type": "openvas", "sourceData": "#\n#VID 6f736456-c060-11dc-982e-001372fd0af2\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n drupal5\n drupal4\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://drupal.org/node/208564\nhttp://secunia.com/advisories/28422/\nhttp://www.vuxml.org/freebsd/6f736456-c060-11dc-982e-001372fd0af2.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(60161);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_version(\"$Revision: 4078 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-16 07:34:17 +0200 (Fri, 16 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2008-0273\");\n script_name(\"FreeBSD Ports: drupal5\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"drupal5\");\nif(!isnull(bver) && revcomp(a:bver, b:\"5.6\")<0) {\n txt += 'Package drupal5 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"drupal4\");\nif(!isnull(bver) && revcomp(a:bver, b:\"4.7.11\")<0) {\n txt += 'Package drupal4 version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}], "nessus": [{"lastseen": "2019-11-01T02:38:33", "bulletinFamily": "scanner", "description": "The Drupal Project reports :\n\nWhen outputting plaintext Drupal strips potentially dangerous HTML\ntags and attributes from HTML, and escapes characters which have a\nspecial meaning in HTML. This output filtering secures the site\nagainst cross site scripting attacks via user input.\n\nCertain byte sequences that are invalid in the UTF8 specification are\nnot handled properly by Internet Explorer 6 and may lead it to see a\nmultibyte start character where none is present. Internet Explorer 6\nthen consumes a number of subsequent UTF-8 characters. This may lead\nto unsafe attributes that were outside a tag for the filter to appear\ninside a tag for Internet Explorer 6. This behaviour can then be used\nto insert and execute JavaScript in the context of the website.", "modified": "2019-11-02T00:00:00", "id": "FREEBSD_PKG_6F736456C06011DC982E001372FD0AF2.NASL", "href": "https://www.tenable.com/plugins/nessus/29951", "published": "2008-01-14T00:00:00", "title": "FreeBSD : drupal -- XSS (utf8) (6f736456-c060-11dc-982e-001372fd0af2)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(29951);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/08/02 13:32:39\");\n\n script_cve_id(\"CVE-2008-0273\");\n script_xref(name:\"Secunia\", value:\"28422\");\n\n script_name(english:\"FreeBSD : drupal -- XSS (utf8) (6f736456-c060-11dc-982e-001372fd0af2)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Drupal Project reports :\n\nWhen outputting plaintext Drupal strips potentially dangerous HTML\ntags and attributes from HTML, and escapes characters which have a\nspecial meaning in HTML. This output filtering secures the site\nagainst cross site scripting attacks via user input.\n\nCertain byte sequences that are invalid in the UTF8 specification are\nnot handled properly by Internet Explorer 6 and may lead it to see a\nmultibyte start character where none is present. Internet Explorer 6\nthen consumes a number of subsequent UTF-8 characters. This may lead\nto unsafe attributes that were outside a tag for the filter to appear\ninside a tag for Internet Explorer 6. This behaviour can then be used\nto insert and execute JavaScript in the context of the website.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://drupal.org/node/208564\"\n );\n # https://vuxml.freebsd.org/freebsd/6f736456-c060-11dc-982e-001372fd0af2.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?b98b321d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_cwe_id(79);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:drupal5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/01/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"drupal5<5.6\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"drupal4<4.7.11\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}