First published: Wed Jun 27 2012(Updated: )
classes/Filter/WhitelistedExternalFilter.php in the Authoring HTML module 6.x-1.x before 6.x-1.1 for Drupal does not properly validate sources with the host white list, which allows remote authenticated users to bypass intended access restrictions and conduct cross-site scripting (XSS) attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Authoring Html 6.x-1.0 | ||
Drupal Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2725 is classified as a moderate severity vulnerability that can lead to cross-site scripting (XSS) attacks.
To fix CVE-2012-2725, you should upgrade the Authoring HTML module to version 6.x-1.1 or later.
CVE-2012-2725 affects users of Drupal with the Authoring HTML module version 6.x-1.0 before the update to 6.x-1.1.
CVE-2012-2725 can allow remote authenticated users to conduct cross-site scripting (XSS) attacks.
CVE-2012-2725 exploits validation failures by bypassing intended access restrictions due to improper host white list validation.