Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2014-003
HistoryJan 22, 2014 - 12:00 a.m.

SA-CONTRIB-2014-003 - Doubleclick for Publishers DFP - Cross Site Scripting (XSS)

2014-01-2200:00:00
Drupal Security Team
www.drupal.org
4

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

This module enables you to create blocks to place advertisements from the Google Double Click for Publishers API (DFP).

The module doesn’t sufficiently sanitize the slot names prior to output into HTML.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer dfp”.

CVE identifier(s) issued

  • CVE-2014-8748

Versions affected

  • DFP 7.x-1.x versions prior to 7.x-1.2.

Drupal core is not affected. If you do not use the contributed Doubleclick for Publishers (DFP) module, there is nothing you need to do.

Solution

Install the latest version:

  • If you use the DFP module for Drupal 7.x, upgrade to Google DFP 7.x-1.2

Also see the Doubleclick for Publishers (DFP) project page.

Reported by

Fixed by

Coordinated by

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2014-003