Voting starts in March for the Drupal Association Board election.
- Advisory ID: DRUPAL-SA-CONTRIB-2009-037
- Project: Views
- Versions: 6.x-2.x
- Date: 2009-June-10
- Security risk: Moderately critical
- Exploitable from: Remote
- Vulnerability: Cross Site Scripting (XSS), Access Bypass
The Views module provides a flexible method for Drupal site designers to control how lists of content are presented.
In the Views UI administrative interface when configuring exposed filters, user input presented as possible exposed filters is not correctly filtered, potentially allowing malicious users to insert arbitrary HTML and script code into these pages. In addition, content entered by users with 'administer views' permission into the View name when defining custom views is subsequently displayed without being filtered. Such cross site scripting (XSS) attacks may lead to a malicious user gaining full administrative access.
An access bypass may exist where unpublished content owned by the anonymous user (e.g. content created by a user whose account was later deleted) is visible to any anonymous user there is a view already configured to show it incorrectly.
An additional access bypass may occur because Views may generate queries which disrespect node access control. Users may be able to access private content if they have permission to see the resulting View.
- Versions of Views for Drupal 6.x prior to 6.x-2.6
Drupal core is not affected. If you do not use the Views module, there is nothing you need to do.
Install the latest version.
- If you use Views for Drupal 6.x upgrade to 6.x-2.6
In addition, preventing the node access bypass may require adding node: access filters to the View manually if using relationships to nodes that might be restricted.
Also see the Views project page.
- The exposed filters XSS was reported by Derek Wright (dww) of the Drupal Security Team
- The XSS from the view name was reported by Justin Klein Keane (Justin_KleinKeane)
- The unpublished content access bypass was reported by Brandon Bergren (bdragon)
- The node access query bypass was reported by Moshe Weitzman (moshe weitzman) of the Drupal Security Team
Earl Miles (merlinofchaos) Views project maintainer.
The security contact for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact and by selecting the security issues category.