Cross-site request forgery (CSRF) vulnerability in the Wishlist module 6.x-2.x before 6.x-2.6 and 7.x-2.x before 7.x-2.6 for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that insert cross-site scripting (XSS) sequences via the (1) wl_reveal or (2) q parameters.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://drupal.org/node/1492624 | patch vendor advisory |
http://secunia.com/advisories/48486 | third party advisory |
http://drupalcode.org/project/wishlist.git/commit/6660c33 | patch |
http://www.madirish.net/content/drupal-wishlist-6x-24-xss-vulnerability | exploit |
http://www.openwall.com/lists/oss-security/2012/04/07/1 | mailing list |
http://drupalcode.org/project/wishlist.git/commit/73aaf98 | patch |
http://drupal.org/node/1483634 | patch |
http://drupal.org/node/1483636 | patch |
http://www.securityfocus.com/bid/52660 | vdb entry |