Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2014-067
HistoryJul 02, 2014 - 12:00 a.m.

SA-CONTRIB-2014-067 - Meta Tags Quick - Multiple vulnerabilities

2014-07-0200:00:00
Drupal Security Team
www.drupal.org
3

CVSS2

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

EPSS

0.001

Percentile

37.1%

Meta tags quick adds meta tags editing to all non-administrative pages of Drupal site.

Redirector abuse in path-based meta tag editing form

When editing a path-based meta tag, module does not check destination parameter of the URL, allowing attacker to pass arbitrary URL to meta tag editing form.

XSS in path-based meta tag editing form

It is possible to inject arbitrary Javascript via the module’s Path-based Metatags edit form that executes when a user attempts to delete a Path-based Metatag.

Both vulnerabilities are mitigated by the fact that an attacker must have a role with the permission “Edit path based meta tags”.

CVE identifier(s) issued

  • Open Redirect: CVE-2014-9363 * Cross-site scripting:CVE-2014-9362

Versions affected

  • Meta tags quick 7.x-2.x versions from and including 7.x-2.1 to 7.x-2.7 (7.x-1.x and 7.x-2.0 are not affected)

Drupal core is not affected. If you do not use the contributed Meta tags quick module, there is nothing you need to do.

Solution

If you use the Meta tags quick 7.x-2.x for Drupal 7, upgrade to Meta tags quick 7.x-2.8

Also see the Meta tags quick project page.

Reported by

Fixed by

Coordinated by

CVSS2

5.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:P/A:N

EPSS

0.001

Percentile

37.1%

Related for DRUPAL-SA-CONTRIB-2014-067