mailing list archives
Drupal Data Module Multiple Vulnerabilities
From: Justin Klein Keane <justin () madirish net>
Date: Wed, 09 Feb 2011 12:40:29 -0500
-----BEGIN PGP SIGNED MESSAGE-----
Description of Vulnerability:
Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL. The Drupal Data module
(http://drupal.org/project/data) "helps you model, manage and query
related sets of tables. It offers an administration interface and a low
level API for manipulating tables and accessing their contents."
The Data module contains multiple Cross Site Scripting (XSS)
vulnerabilities because it fails to sanitize table descriptions, field
names or labels before display. This results in multiple stored XSS as
well as DOM based XSS vulnerabilities. Drupal site users with the
ability to create or edit tables using the Data module could inject
arbitrary HTML into administrative pages.
The Data module also contains numerous SQL injection vulnerabilities
because it fails to sanitize values for table names or column names
before invoking SQL statements. This allows users with the ability to
create or edit tables managed by the Data module to perform SQL
Drupal 6.20 with Data 6.x-1.0-alpha14 was tested and shown to be vulnerable.
User could inject arbitrary scripts into pages affecting site users.
This could result in administrative account compromise leading to web
server process compromise. A more likely scenario would be for an
attacker to inject hidden content (such as iframes, applets, or embedded
objects) that would attack client browsers in an attempt to compromise
site users' machines. This vulnerability could also be used to launch
cross site request forgery (XSRF) attacks against the site that could
have other unexpected consequences.
In order to exploit this vulnerability the attacker must have
credentials to an authorized account that has been assigned the
permissions to administer or edit in the Data module. This could be
accomplished via social engineering, brute force password guessing, or
abuse or legitimate credentials.
Drupal security team does not handle issues with pre-release versions of
modules (such as alpha or dev). These issues were reported in the
module's public issue queue (http://drupal.org/node/1056470).
The text of this advisory has also been posted at
Justin C. Klein Keane
The digital signature on this message can be confirmed
using the public key at http://www.madirish.net/gpgkey
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
-----END PGP SIGNATURE-----
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Drupal Data Module Multiple Vulnerabilities Justin Klein Keane (Feb 09)