Closed (fixed)
Project:
Echo
Version:
8.x-1.x-dev
Component:
Code
Priority:
Normal
Category:
Bug report
Assigned:
Reporter:
Created:
9 Sep 2011 at 16:46 UTC
Updated:
1 Oct 2011 at 20:01 UTC
It has been reported that the Echo module has a security vulnerability in that it allows an external hacker to craft a URL that causes the target site to display arbitrary data, without limitation.
Since receiving and responding to the original security team report, I have not heard from them in a long time, and I have since lost the original email and thus have no way to update the official report.
Therefore, I have fixed the issue on my own as follows:
$_REQUEST data is now sanitized by filter_xss().echo_themed_page() function now stores a hash of its arguments in the cache. The _echo_access() function checks for the existence of this cache entry ensure that the request was indeed generated by echo_themed_page() and not by an external source.This means that the Echo module now depends on a working cache implementation.
Comments
Comment #1
pillarsdotnet commented6.x-1.7
7.x-1.7
8.x-1.7
Comment #2
pillarsdotnet commentedCrosslink: https://security.drupal.org/node/61334
Comment #3
andros commentedHi, since i updated to version 7.x-1.7, my html newsletter won't work any more. what is the right way to configure my site to work with this version?
I use Simplenews with HTML Mail and a custom text-filter ( with Transliteration, Emogrifier and Pathologic) on a own theme for the HTML Mail output.
Comment #4
pillarsdotnet commented@andros -- please open up a new issue.
Comment #5.0
(not verified) commentedReplaced dummy content with real bug report