- Advisory ID: SA-CONTRIB-2011-041
- Project: Hostmaster (Aegir) (third-party module)
- Version: 6.x
- Date: 2011-September-21
- Security risk: Moderately critical
- Exploitable from: Remote
- Vulnerability: Cross Site Scripting
Description
Hostmaster (Aegir) provides a system for managing Drupal sites.
The theme in Hostmaster, Eldir, does not sanitize the custom body classes correctly leading to a cross site scripting (XSS) vulnerability that can be exploited when a user is made to view a specially crafted URL. If the user is logged into an administrative account then the script can take actions using their permissions or disclose sensitive information to a third party.
This vulnerability is mitigated by the fact that user being attacked must be logged into Aegir with a privileged account and tricked into visiting a specially crafted URL.
Versions affected
- Hostmaster (Aegir) 6.x-1.x versions prior to 6.x-1.4.
Drupal core is not affected. If you do not use the contributed Hostmaster (Aegir) module, there is nothing you need to do.
Solution
Follow the upgrade instructions in the release notes for the Aegir 1.4 release which can be found at: http://community.aegirproject.org/1.4
Please note that if you have installed Aegir using the debian packages, manual intervention is currently required, and you should read the release notes at the above link for more information.
See also the Hostmaster (Aegir) project page.
Reported by
- Khawer Masood and affiliated security team
Fixed by
- Steven Jones the module maintainer
Coordinated by
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.