CERTA-2006-AVI-335

Vulnerability from certfr_avis - Published: 2006-08-04 - Updated: 2006-08-04

Une vulnérabilité dans Drupal permet à un utilisateur distant de conduire une attaque de type cross-site scripting.

Description

Un manque de contrôle des paramètres passés au module user.module de Drupal permet à un utilisateur distant d'injecter indirectement du script ou du code HTML dans les pages visualisées par un utilisateur de l'application Drupal vulnérable.

Solution

Les versions 4.6.9 et 4.7.3 corrigent le problème :

http://www.drupal.org/node/76748
None
Impacted products
Vendor Product Description
Drupal Drupal Drupal version 4.6.8 et antérieures ;
Drupal Drupal Drupal version 4.7.2 et antérieures.

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Drupal version 4.6.8 et ant\u00e9rieures ;",
      "product": {
        "name": "Drupal",
        "vendor": {
          "name": "Drupal",
          "scada": false
        }
      }
    },
    {
      "description": "Drupal version 4.7.2 et ant\u00e9rieures.",
      "product": {
        "name": "Drupal",
        "vendor": {
          "name": "Drupal",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUn manque de contr\u00f4le des param\u00e8tres pass\u00e9s au module user.module de\nDrupal permet \u00e0 un utilisateur distant d\u0027injecter indirectement du\nscript ou du code HTML dans les pages visualis\u00e9es par un utilisateur de\nl\u0027application Drupal vuln\u00e9rable.\n\n## Solution\n\nLes versions 4.6.9 et 4.7.3 corrigent le probl\u00e8me :\n\n    http://www.drupal.org/node/76748\n",
  "cves": [],
  "initial_release_date": "2006-08-04T00:00:00",
  "last_revision_date": "2006-08-04T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 drupal  DRUPAL-SA-2006-011 du 2 ao\u00fbt 2006 :",
      "url": "http://www.drupal.org/node/76748"
    }
  ],
  "reference": "CERTA-2006-AVI-335",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2006-08-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Cross-site scripting"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans Drupal permet \u00e0 un utilisateur distant de\nconduire une attaque de type cross-site scripting.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Drupal",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Drupal DRUPAL-SA-2006-011 du 2 ao\u00fbt 2006",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…