Short Name |
HTTP:XSS:DRUPAL-CUMULAS |
---|---|
Severity |
Medium |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Drupal Cumulus Module Cross Site Scripting |
Release Date |
2011/03/10 |
Update Number |
1880 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known cross-site scripting vulnerability in Drupal. It is due to insufficient validation of user-supplied input in Cumulus module. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in the compromise of Web browser cookies associated with the site, and modification of user information.
The Cumulus module for Drupal is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Versions prior to Cumulus 6.x-1.4 and 5.x-1.1 are vulnerable.