FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

drupal -- multiple XSS vulnerabilities

Affected packages
drupal < 4.6.10

Details

VuXML ID b2383758-5f15-11db-ae08-0008743bf21a
Discovery 2006-10-18
Entry 2006-10-18

The Drupal Team reports:

A bug in input validation and lack of output validation allows HTML and script insertion on several pages.

Drupal's XML parser passes unescaped data to watchdog under certain circumstances. A malicious user may execute an XSS attack via a specially crafted RSS feed. This vulnerability exists on systems that do not use PHP's mb_string extension (to check if mb_string is being used, navigate to admin/settings and look under "String handling"). Disabling the aggregator module provides an immediate workaround.

The aggregator module, profile module, and forum module do not properly escape output of certain fields.

Note: XSS attacks may lead to administrator access if certain conditions are met.

References

URL http://drupal.org/drupal-4.7.4
URL http://drupal.org/files/sa-2006-024/advisory.txt