Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2015-073
HistoryMar 04, 2015 - 12:00 a.m.

SA-CONTRIB-2015-073 - Trick Question - Cross Site Scripting (XSS)

2015-03-0400:00:00
Drupal Security Team
www.drupal.org

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

The Trick Question is a CAPTCHA-type spam prevention module; a lightweight, compact and simple alternative to larger and more complex modules.

The module doesn’t sufficiently sanitize user supplied text in some pages, thereby exposing a Cross Site Scripting vulnerability.

The vulnerability is mitigated by the fact that an attacker must have the “Administer Trick Question” permission.

CVE identifier(s) issued

  • CVE-2015-4369

Versions affected

  • Trick Question 6.x-1.x versions prior to 6.x-1.5
  • Trick Question 7.x-1.x versions prior to 7.x-1.5

Drupal core is not affected. If you do not use the contributed Trick Question module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Trick Question project page.

Reported by

  • Matt Vance provisional member of the Drupal Security Team

Fixed by

Coordinated by

  • Matt Vance provisional member of the Drupal Security Team

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

0.967 High

EPSS

Percentile

99.7%

Related for DRUPAL-SA-CONTRIB-2015-073