Full Disclosure mailing list archives

Re: [Security-news] SA-CONTRIB-2012-126 - Hotblocks - Cross Site Scripting (XSS) and Denial of Service (DoS)


From: "Justin C. Klein Keane" <justin () madirish net>
Date: Wed, 15 Aug 2012 14:49:51 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For the curious:

XSS Exploit:
- ---------------
1.  Install and enable the HotBlocks module
2.  Navigate the Hotblocks setting page at ?q=admin/settings/hotblocks
3.  Change Block #1 Name to "<script>alert('xss');</script>"
4.  View the rendered Javascript at ?q=admin/content/hotblocks

Denial of Service Exploit:
- --------------------------------
1.  Install and enable the HotBlocks module
2.  Navigate the Hotblocks setting page at ?q=admin/settings/hotblocks
3.  Change Block #1 Name to "<script>alert('xss');</script>"
4.  Change "Term for hotblocks item:" to "hotblock item
<script>alert('hotblock term');</script>"
5.  Change "Term for hotblocks items:" to "hotblock item
<script>alert('hotblock terms');</script>"
6.  Save configuration
7.  Go to Block admin at ?q=admin/build/block
8.  Drag the Block #1 to the left sidebar and 'Save'
9.  Return to the home page.
9.  Click the 'Put a hotblock here' icon in the left sidebar and click
the malicious name.  This points to a link such as
hotblocks/assign/11/1?destination=node&path=node&systemtype=block&token=343d600c37a2ed557df7cd22a0010352
10.  Refresh the page - WSOD, error logs indicate something like:
[Mon Aug 06 15:42:37 2012] [notice] child pid 4559 exit signal
Segmentation fault (11)
or
[Mon Aug 06 15:22:29 2012] [error] [client 10.10.0.1] PHP Fatal error:
 Maximum execution time of 30 seconds exceeded in
/var/www/html/drupal-6.26/includes/bootstrap.inc on line 860, referer:
http://10.10.0.101/drupal/


Justin C. Klein Keane
http://www.MadIrish.net

The PGP signature on this email can be verified using the public key at
http://www.madirish.net/gpgkey

On 08/15/2012 02:19 PM, security-news () drupal org wrote:
View online: http://drupal.org/node/1732946

* Advisory ID: DRUPAL-SA-CONTRIB-2012-126 * Project: HotBlocks [1]
(third-party module) * Version: 6.x * Date: 2012-August-15 *
Security risk: Moderately critical [2] * Exploitable from: Remote *
Vulnerability: Cross Site Scripting, Multiple vulnerabilities

-------- DESCRIPTION 
---------------------------------------------------------

The Hotblocks module provides an enhanced GUI for administering
blocks and block content that is intended to be simpler and more
controllable for less privileged users than the default block
administration tools.

.... Cross Site Scripting (XSS)

The module doesn't sufficiently sanitize the user input for "block
names" on the module's settings page. A user could inject arbitrary
scripts into pages affecting site users.

This XSS vulnerability is mitigated by the fact that an attacker
must have a role with the permission "administer hotblocks".

.... Denial of Service (DoS)

The hotblocks user interface also allows a user to configure one
hotblock to reference itself as content, thereby creating an
infinite loop and potentially rendering a site unusable.

The DoS vulnerability is mitigated by the fact that a user must
have a role with the permission "administer hotblocks" or a user
with said permission must have configured the site such that it
allows hotblocks to be embedded in other hotblocks.

CVE: Requested

-------- VERSIONS AFFECTED 
---------------------------------------------------

* Hotblocks 6.x-1.x versions prior to 6.x-1.8.

Drupal core is not affected. If you do not use the contributed
HotBlocks [3] module, there is nothing you need to do.

-------- SOLUTION 
------------------------------------------------------------

Install the latest version:

* If you use the Hotblocks module for Drupal 6.x, upgrade to
Hotblocks 6.x-1.8 [4]

Also see the HotBlocks [5] project page.

-------- REPORTED BY 
---------------------------------------------------------

* Justin C. Klein Keane [6]

-------- FIXED BY 
------------------------------------------------------------

* Justin Dodge [7] the module maintainer

-------- COORDINATED BY 
------------------------------------------------------

* Greg Knaddison [8] of the Drupal Security Team

-------- CONTACT AND MORE INFORMATION 
----------------------------------------

The Drupal security team can be reached at security at drupal.org
or via the contact form at http://drupal.org/contact [9].

Learn more about the Drupal Security team and their policies [10],
writing secure code for Drupal [11], and securing your site [12].


[1] http://drupal.org/project/hotblocks [2]
http://drupal.org/security-team/risk-levels [3]
http://drupal.org/project/hotblocks [4]
http://drupal.org/node/1732828 [5]
http://drupal.org/project/hotblocks [6]
http://drupal.org/user/302225 [7] http://drupal.org/user/238638 [8]
http://drupal.org/user/36762 [9] http://drupal.org/contact [10]
http://drupal.org/security-team [11]
http://drupal.org/writing-secure-code [12]
http://drupal.org/security/secure-configuration

_______________________________________________ Security-news
mailing list Security-news () drupal org Unsubscribe at
http://lists.drupal.org/mailman/listinfo/security-news

_______________________________________________ Full-Disclosure -
We believe in it. Charter:
http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
sponsored by Secunia - http://secunia.com/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iPwEAQECAAYFAlAr708ACgkQkSlsbLsN1gCDJQb/XAYzsmAgbD/Sd6yAIuNXRTbJ
F6CW8laAHOKuZjUQdhBUJuOaXSMIqXEut9xerPzlEfXX0WWo5nyMIdsjezP+CUck
l+IzYVuRiLHDR2Ra5GSzHuOB+h7VjSJkynEThZBDFRyLBYtSvNDZ/QATn5Orhp/2
oCcx5443PECvkdzUsGTzCPBQiucIPFuzQTYggsd23Zf70Nqkq/VMW4xA+rVHOFLS
f61DH1feqhYNUW3GG7lhuqUX9vAHLjFQlgGWt8gD2o7tZ6wMFrtKsSouYsDavwAm
KamG8mEM+2+IdhDacqE=
=ubeS
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: