- Advisory ID: DRUPAL-SA-CONTRIB-2015-043
- Project: Commerce Balanced Payments (third-party module)
- Version: 7.x
- Date: 2015-February-11
- Security risk: 14/25 ( Moderately Critical) AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:All
- Vulnerability: Cross Site Scripting, Cross Site Request Forgery, Multiple vulnerabilities
Description
Commerce Balanced Payments module integrates Drupal Commerce with the Balanced Payments third-party service.
The module doesn’t sufficiently sanitize user supplied text in the Bank Account Listing Page, thereby exposing a Cross Site Scripting vulnerability.
Also, some URLs were not protected against CSRF. A malicious user can cause another user to delete their configured bank accounts by getting their browser to make a request to a specially-crafted URL.
CVE identifier(s) issued
- A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.
Versions affected
- All versions of Commerce Balanced Payments.
Drupal core is not affected. If you do not use the contributed Commerce Balanced Payments module, there is nothing you need to do.
Solution
If you use the Commerce Balanced Payments module you should uninstall it.
Also see the Commerce Balanced Payments project page.
Reported by
- Pere Orga of the Drupal Security Team
Fixed by
Not applicable.
Coordinated by
- Pere Orga of the Drupal Security Team
Contact and More Information
The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.
Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.
Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity