CVE-2024-13298
📋 TL;DR
This Cross-Site Scripting (XSS) vulnerability in Drupal's Tarte au Citron module allows attackers to inject malicious scripts into web pages viewed by other users. It affects Drupal sites using Tarte au Citron versions 2.0.0 through 2.0.4. Site administrators and users who view compromised pages are at risk.
💻 Affected Systems
- Drupal Tarte au Citron module
📦 What is this software?
Tarte Au Citron by Kleegroup
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, redirect users to malicious sites, or deface the website.
Likely Case
Attackers inject malicious JavaScript to steal user session cookies or credentials, potentially compromising user accounts.
If Mitigated
With proper input validation and output encoding, the attack surface is reduced, but the vulnerability still exists in the codebase.
🎯 Exploit Status
XSS vulnerabilities typically have low exploitation complexity. The advisory doesn't specify authentication requirements, but XSS often requires some user interaction.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.5
Vendor Advisory: https://www.drupal.org/sa-contrib-2024-064
Restart Required: No
Instructions:
1. Update the Tarte au Citron module to version 2.0.5 via Drupal's update manager or Composer. 2. Clear Drupal caches. 3. Verify the update was successful.
🔧 Temporary Workarounds
Disable Tarte au Citron module
linuxTemporarily disable the vulnerable module until patching is possible
drush pm:disable tarte_au_citron
Implement Content Security Policy
allAdd CSP headers to mitigate XSS impact by restricting script execution
🧯 If You Can't Patch
- Implement web application firewall rules to block XSS payloads
- Enable Drupal's built-in XSS protection features and ensure input validation is enforced
🔍 How to Verify
Check if Vulnerable:
Check the Tarte au Citron module version in Drupal's Extend page or via drush: drush pm:list | grep tarte_au_citron
Check Version:
drush pm:list --fields=name,version | grep tarte_au_citron
Verify Fix Applied:
Confirm the module version is 2.0.5 or higher and test for XSS payloads in affected fields
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript payloads in request logs
- Multiple requests with script tags or event handlers
Network Indicators:
- HTTP requests containing <script> tags or JavaScript event handlers like onload, onerror
SIEM Query:
web_requests WHERE url_parameters CONTAINS '<script>' OR url_parameters CONTAINS 'javascript:'