Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2014-052
HistoryMay 14, 2014 - 12:00 a.m.

SA-CONTRIB-2014-052 - AddressField Tokens - Cross Site Scripting (XSS)

2014-05-1400:00:00
Drupal Security Team
www.drupal.org
6

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

42.0%

The AddressField Tokens module extends the addressfield module by adding token support. It also adds some convenient addressfield formatters and provides Webform addressfield integration.

The module does not properly filter address field values, resulting in a Cross Site Scripting (XSS) vulnerability which can be leveraged by any user that can edit an addressfield on a site displaying that field using the “address components” field formatter.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission to create or edit an AddressField field (e.g. create or edit a node).

CVE identifier(s) issued

  • CVE-2014-3933

Versions affected

  • AddressField Tokens 7.x-1.x versions prior to 7.x-1.4.

Drupal core is not affected. If you do not use the contributed Addressfield Tokens module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Addressfield Tokens project page.

Reported by

Fixed by

Coordinated by

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

42.0%

Related for DRUPAL-SA-CONTRIB-2014-052