The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://drupal.org/SA-CORE-2012-004 - Patch, Vendor Advisory | |
References | () http://drupalcode.org/project/drupal.git/commitdiff/b47f95d - Exploit, Patch | |
References | () http://drupalcode.org/project/drupal.git/commitdiff/da8023a - Exploit, Patch | |
References | () http://osvdb.org/88529 - Broken Link | |
References | () http://www.debian.org/security/2013/dsa-2776 - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:074 - Broken Link | |
References | () http://www.openwall.com/lists/oss-security/2012/12/20/1 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/56993 - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/80795 - |
Information
Published : 2013-01-03 01:55
Updated : 2024-11-21 01:45
NVD link : CVE-2012-5653
Mitre link : CVE-2012-5653
CVE.ORG link : CVE-2012-5653
JSON object : View
Products Affected
debian
- debian_linux
drupal
- drupal
CWE
CWE-20
Improper Input Validation