CVE-2009-2372

Drupal 6.x before 6.13 does not prevent users from modifying user signatures after the associated comment format has been changed to an administrator-controlled input format, which allows remote authenticated users to inject arbitrary web script, HTML, and possibly PHP code via a crafted user signature.
References
Link Resource
http://drupal.org/node/507572 Patch Vendor Advisory
http://osvdb.org/55525 Broken Link
http://secunia.com/advisories/35681 Third Party Advisory
http://www.securitytracker.com/id?1022497 Patch Third Party Advisory VDB Entry
http://drupal.org/node/507572 Patch Vendor Advisory
http://osvdb.org/55525 Broken Link
http://secunia.com/advisories/35681 Third Party Advisory
http://www.securitytracker.com/id?1022497 Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:04

Type Values Removed Values Added
References () http://drupal.org/node/507572 - Patch, Vendor Advisory () http://drupal.org/node/507572 - Patch, Vendor Advisory
References () http://osvdb.org/55525 - Broken Link () http://osvdb.org/55525 - Broken Link
References () http://secunia.com/advisories/35681 - Third Party Advisory () http://secunia.com/advisories/35681 - Third Party Advisory
References () http://www.securitytracker.com/id?1022497 - Patch, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1022497 - Patch, Third Party Advisory, VDB Entry

Information

Published : 2009-07-08 15:30

Updated : 2024-11-21 01:04


NVD link : CVE-2009-2372

Mitre link : CVE-2009-2372

CVE.ORG link : CVE-2009-2372


JSON object : View

Products Affected

drupal

  • drupal
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')