• Advisory ID: DRUPAL-SA-CONTRIB-2012-051
  • Project: Activity (third-party module)
  • Version: 6.x
  • Date: 2012-March-28
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting, Cross Site Request Forgery


The XSS issue is:
CVE: CVE-2012-2078
The CSRF issue is:
CVE: CVE-2012-2079

The Activity module keeps track of the things people do on your site and provides mini-feeds of these activities in blocks, in a specialized table, and via RSS. The module is extensible so that any other module can integrate with it. The messages that are produced are customizable via the admin interface and are context sensitive.

The 6.x-1.x branch of the module does not filter output of the module settings correctly leading to a cross site scripting vulnerability (XSS). It also does not confirm user intent when removing a single activity resulting in a cross site request forgery vulnerability.

The XSS vulnerability is mitigated by the fact that it requires the malicious user to have a role with the "access administration pages" and "administer activity" permissions.

Versions affected

  • All releases of the 6.x-1.x branch

Drupal core is not affected. If you do not use the contributed Activity module, there is nothing you need to do.


Install the latest version:

  • The 6.x-1.x branch of this module is no longer supported. Upgrade to 6.x-2.0-alpha1

Note that there is currently no upgrade path. Users of the module are encouraged to work in the module queue to help build an upgrade path. Also see the Activity project page.

Reported by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.