CVE-2009-1575

Cross-site scripting (XSS) vulnerability in Drupal 5.x before 5.17 and 6.x before 6.11, as used in vbDrupal before 5.17.0, allows remote attackers to inject arbitrary web script or HTML via crafted UTF-8 byte sequences before the Content-Type meta tag, which are treated as UTF-7 by Internet Explorer 6 and 7.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.0:beta1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.0:beta2:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.1_rev1.1:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.5.:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.10:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.11:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.12:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.13:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.14:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.15:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:5.16:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6:beta1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:rc-1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:rc-2:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:rc-3:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:rc-4:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*

History

21 Nov 2024, 01:02

Type Values Removed Values Added
References () http://drupal.org/node/449078 - Patch, Vendor Advisory () http://drupal.org/node/449078 - Patch, Vendor Advisory
References () http://secunia.com/advisories/34948 - Vendor Advisory () http://secunia.com/advisories/34948 - Vendor Advisory
References () http://secunia.com/advisories/34950 - Vendor Advisory () http://secunia.com/advisories/34950 - Vendor Advisory
References () http://secunia.com/advisories/34980 - () http://secunia.com/advisories/34980 -
References () http://www.debian.org/security/2009/dsa-1792 - () http://www.debian.org/security/2009/dsa-1792 -
References () http://www.osvdb.org/54152 - Patch () http://www.osvdb.org/54152 - Patch
References () http://www.vbdrupal.org/forum/showthread.php?p=9953#post9953 - Patch, Vendor Advisory () http://www.vbdrupal.org/forum/showthread.php?p=9953#post9953 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/1216 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1216 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50250 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50250 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00108.html - () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00108.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00133.html - () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00133.html -

Information

Published : 2009-05-06 17:30

Updated : 2024-11-21 01:02


NVD link : CVE-2009-1575

Mitre link : CVE-2009-1575

CVE.ORG link : CVE-2009-1575


JSON object : View

Products Affected

drupal

  • drupal
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')