• Advisory ID: DRUPAL-SA-CONTRIB-2014-067
  • Project: Meta tags quick (third-party module)
  • Version: 7.x
  • Date: 2014-July-02
  • Security risk: Moderately critical
  • Exploitable from: Remote
  • Vulnerability: Cross Site Scripting, Open Redirect

Description

Meta tags quick adds meta tags editing to all non-administrative pages of Drupal site.

Redirector abuse in path-based meta tag editing form

When editing a path-based meta tag, module does not check destination parameter of the URL, allowing attacker to pass arbitrary URL to meta tag editing form.

XSS in path-based meta tag editing form

It is possible to inject arbitrary Javascript via the module's Path-based Metatags edit form that executes when a user attempts to delete a Path-based Metatag.

Both vulnerabilities are mitigated by the fact that an attacker must have a role with the permission "Edit path based meta tags".

CVE identifier(s) issued

  • Open Redirect: CVE-2014-9363
  • Cross-site scripting: CVE-2014-9362

Versions affected

  • Meta tags quick 7.x-2.x versions from and including 7.x-2.1 to 7.x-2.7 (7.x-1.x and 7.x-2.0 are not affected)

Drupal core is not affected. If you do not use the contributed Meta tags quick module, there is nothing you need to do.

Solution

If you use the Meta tags quick 7.x-2.x for Drupal 7, upgrade to Meta tags quick 7.x-2.8

Also see the Meta tags quick project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at http://drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.


Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity