|
Family: CGI abuses --> Category: attack
Drupal Comment Preview Code Execution Vulnerability (2) Vulnerability Scan
Vulnerability Scan Summary Tries to execute a command via Drupal
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that allows execution
of arbitrary code.
Description :
The version of Drupal installed on the remote host fails to properly
validate previews on comments and allows access to more than one input
filter, which is not true by default. A possible hacker can leverage this
issue while previewing a comment to have it interpreted as PHP code,
which will result in it being executed on the affected host with the
rights of the web server user id.
See also :
http://drupal.org/node/113935
Solution :
Upgrade to Drupal version 4.7.6 / 5.1 or later.
Threat Level:
Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|