CVE-2015-6660

The Form API in Drupal 6.x before 6.37 and 7.x before 7.39 does not properly validate the form token, which allows remote attackers to conduct CSRF attacks that upload files in a different user's account via vectors related to "file upload value callbacks."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.33:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.34:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.35:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6.36:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*

History

21 Nov 2024, 02:35

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165061.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165690.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165704.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165723.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165733.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165840.html -
References () http://www.debian.org/security/2015/dsa-3346 - () http://www.debian.org/security/2015/dsa-3346 -
References () http://www.securitytracker.com/id/1033358 - () http://www.securitytracker.com/id/1033358 -
References () https://www.drupal.org/SA-CORE-2015-003 - Patch, Vendor Advisory () https://www.drupal.org/SA-CORE-2015-003 - Patch, Vendor Advisory

Information

Published : 2015-08-24 14:59

Updated : 2024-11-21 02:35


NVD link : CVE-2015-6660

Mitre link : CVE-2015-6660

CVE.ORG link : CVE-2015-6660


JSON object : View

Products Affected

drupal

  • drupal
CWE
CWE-352

Cross-Site Request Forgery (CSRF)