Voting starts in March for the Drupal Association Board election.
- Advisory ID: DRUPAL-SA-CONTRIB-2009-061
- Project: Markdown Preview (third-party module)
- Version: 6.x
- Date: 2009 September 23
- Security risk: Less critical
- Exploitable from: Remote
- Vulnerability: Cross Site Scripting
The Markdown Preview module provides a live preview pane that displays the rendered HTML output of your Markdown input. When displaying the live preview, the module does not properly escape user entered data, leading to a cross-site scripting (XSS) vulnerability. Such an attack may lead to a malicious user gaining full administrative access.
- Markdown Preview for Drupal 6.x
Drupal core is not affected. If you do not use the contributed Markdown Preview module, there is nothing you need to do.
The Markdown Preview module has been abandoned and its releases have been unpublished. It is recommended that it be disabled and removed from your server if in use.
For Markdown live preview functionality for nodes and comments, use the Live module, which properly escapes the user entered data using the content's current input format. See the Markdown Preview project page for instructions how to enable Markdown preview functionality with the Live module.
Reported by David Needham.
The security contact for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.