Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2013-037
HistoryMar 27, 2013 - 12:00 a.m.

SA-CONTRIB-2013-037 - Rules - Cross Site Scripting (XSS)

2013-03-2700:00:00
Drupal Security Team
www.drupal.org
5

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

50.8%

The Rules module allows site administrators to define conditionally executed actions based on occurring events (known as reactive or ECA rules). It’s a replacement with more features for the trigger module in core.

The module contains a persistent cross site scripting (XSS) vulnerability due to the fact that it fails to sanitize rule tags before display.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer rules”.

CVE identifier(s) issued

  • CVE-2013-1906

Versions affected

  • Rules 7.x-2.x versions prior to 7.x-2.3.

Drupal core is not affected. If you do not use the contributed Rules module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Rules module for Drupal 7.x, upgrade to Rules 7.x-2.3

Also see the Rules project page.

Reported by

Fixed by

Coordinated by

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

50.8%

Related for DRUPAL-SA-CONTRIB-2013-037