Drupal 6.x before 6.13 does not prevent users from modifying user signatures after the associated comment format has been changed to an administrator-controlled input format, which allows remote authenticated users to inject arbitrary web script, HTML, and possibly PHP code via a crafted user signature.
References
Link | Resource |
---|---|
http://drupal.org/node/507572 | Patch Vendor Advisory |
http://osvdb.org/55525 | Broken Link |
http://secunia.com/advisories/35681 | Third Party Advisory |
http://www.securitytracker.com/id?1022497 | Patch Third Party Advisory VDB Entry |
http://drupal.org/node/507572 | Patch Vendor Advisory |
http://osvdb.org/55525 | Broken Link |
http://secunia.com/advisories/35681 | Third Party Advisory |
http://www.securitytracker.com/id?1022497 | Patch Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://drupal.org/node/507572 - Patch, Vendor Advisory | |
References | () http://osvdb.org/55525 - Broken Link | |
References | () http://secunia.com/advisories/35681 - Third Party Advisory | |
References | () http://www.securitytracker.com/id?1022497 - Patch, Third Party Advisory, VDB Entry |
Information
Published : 2009-07-08 15:30
Updated : 2024-11-21 01:04
NVD link : CVE-2009-2372
Mitre link : CVE-2009-2372
CVE.ORG link : CVE-2009-2372
JSON object : View
Products Affected
drupal
- drupal
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')