Multiple cross-site scripting (XSS) vulnerabilities in the FAQ module 6.x-1.x before 6.x-1.13 and 7.x-1.x-rc1 for Drupal allow remote authenticated users to inject arbitrary web script or HTML via the (1) title parameter in faq.admin.inc or (2) detailed_question parameter in faq.module.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://drupal.org/node/1451194 | vendor advisory |
http://drupalcode.org/project/faq.git/commit/912f1d2 | patch |
http://osvdb.org/79466 | vdb entry |
http://secunia.com/advisories/48131 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/52126 | vdb entry |
http://drupalcode.org/project/faq.git/blobdiff/525fb85e5a43cb6cfe3028aa88eaf8a6e40548d5..f381756:/faq.admin.inc | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2012/04/07/1 | mailing list |
http://drupalcode.org/project/faq.git/commit/f381756 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73452 | vdb entry |
http://drupalcode.org/project/faq.git/blobdiff/2991dd94e70a2881571a4b777645f4dcc42c1f10..912f1d2:/faq.module | patch vendor advisory |