FreeBSD : drupal -- XSS (7a1ab8d4-35c1-11de-9672-0030843d3802)

This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing one or more security-related

Description :

Drupal Security Team reports :

When outputting user-supplied data Drupal strips potentially dangerous
HTML attributes and tags or escapes characters which have a special
meaning in HTML. This output filtering secures the site against cross
site scripting attacks via user input.

Certain byte sequences that are valid in the UTF-8 specification are
potentially dangerous when interpreted as UTF-7. Internet Explorer 6
and 7 may decode these characters as UTF-7 if they appear before the
meta http-equiv='Content-Type' tag that specifies the page content as
UTF-8, despite the fact that Drupal also sends a real HTTP header
specifying the content as UTF-8. This behaviour enables malicious
users to insert and execute JavaScript in the context of the website
if site visitors are allowed to post content.

In addition, Drupal core also has a very limited information
disclosure vulnerability under very specific conditions. If a user is
tricked into visiting the site via a specially crafted URL and then
submits a form (such as the search box) from that page, the
information in their form submission may be directed to a third-party
site determined by the URL and thus disclosed to the third party. The
third party site may then execute a CSRF attack against the submitted

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 38657 (freebsd_pkg_7a1ab8d435c111de96720030843d3802.nasl)

Bugtraq ID:

CVE ID: CVE-2009-1575

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now