This script is Copyright (C) 2009-2014 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
The Drupal Security Team reports :
When outputting user-supplied data Drupal strips potentially dangerous
HTML attributes and tags or escapes characters which have a special
meaning in HTML. This output filtering secures the site against cross
site scripting attacks via user input.
Certain byte sequences that are valid in the UTF-8 specification are
potentially dangerous when interpreted as UTF-7. Internet Explorer 6
and 7 may decode these characters as UTF-7 if they appear before the
<meta http-equiv='Content-Type' /> tag that specifies the page content
as UTF-8, despite the fact that Drupal also sends a real HTTP header
specifying the content as UTF-8. This enables attackers to execute
cross site scripting attacks with UTF-7. SA-CORE-2009-005 - Drupal
core - Cross site scripting contained an incomplete fix for the issue.
HTML exports of books are still vulnerable, which means that anyone
with edit permissions for pages in outlines is able to insert
arbitrary HTML and script code in these exports.
Additionally, the taxonomy module allows users with the 'administer
taxonomy' permission to inject arbitrary HTML and script code in the
help text of any vocabulary.
See also :
Update the affected packages.
Risk factor :
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 38805 (freebsd_pkg_a6605f4b406711deb444001372fd0af2.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now