Vulnerability: Cross Site Request Forgery, Open Redirect
Description
Tadaa! is a module aimed at simplifying the process of enabling/disabling modules and altering configuration when switching between different environments, e.g. Production/Staging/Development.
The module exposes multiple paths that were not protected against Cross Site Request Forgeries (CSRF). A malicious user could cause a user with “Use Tadaa!” permission to enable and disable modules or change variables by getting his browser to make a request to a specially-crafted URL while logged in.
Also, these callbacks had a destination query parameter that was not protected against open redirects.
CVE identifier(s) issued
A CVE identifier will be requested, and added upon issuance, in accordance
with Drupal Security Team processes.
Versions affected
Tadaa! 7.x-1.x versions prior to 7.x-1.4.
Drupal core is not affected. If you do not use the contributed Tadaa! module,
there is nothing you need to do.
Solution
Install the latest version:
If you use the Tadaa! module for Drupal 7.x, upgrade to Tadaa! 7.x-1.4
Vulnerability: Cross Site Scripting, Cross Site Request Forgery
Description
The Wishlist module enables authorized users to create wishlist nodes which describe items they would like for a special occasion. Also, it allows users to indicate their intention to purchase items for other users.
The module fails to sanitize user input in log messages, leading to a Cross Site Scripting (XSS) vulnerability. This vulnerability is mitigated by the fact that an attacker must have a role with the permission “access wishlists”, and that only sites with dblog module enabled are affected (dblog module is enabled by default).
Also, the paths to manage wishlist purchase intentions do not confirm the intent of a user. A malicious user could cause another user to delete wishlist purchase intentions by getting their browser to make a request to a specially-crafted URL, a Cross-Site Request Forgery (CSRF).
CVE identifier(s) issued
A CVE identifier will be requested, and added upon issuance, in accordance
with Drupal Security Team processes.
Versions affected
Wishlist 7.x-2.x versions prior to 7.x-2.7.
Wishlist 6.x-2.x versions prior to 6.x-2.7.
Drupal core is not affected. If you do not use the contributed Wishlist Module module,
there is nothing you need to do.
Solution
Install the latest version:
If you use the Wishlist module for Drupal 7.x, upgrade to Wishlist 7.x-2.7.
If you use the Wishlist module for Drupal 6.x, upgrade to Wishlist 6.x-2.7.
The AusCERT2015 Call For Presentations has been extended by one week. It will be held at the RACV Royal Pines Resort, Gold Coast, Australia June 1st through the 5th, 2015.
Sierra Wireless produces a mobile wi-fi hotspot device that is popular amongst telecommunication companies for re-branding to suit local markets. The AirCard 760S/762S/763S Web-based Administrative Console suffers from a HTTP header injection that allows an attacker to inject a file into the HTTP response from the device.