The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.
References
Link | Resource |
---|---|
http://drupalcode.org/project/drupal.git/commitdiff/da8023a | Exploit Patch |
http://drupal.org/SA-CORE-2012-004 | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2012/12/20/1 | Third Party Advisory |
http://osvdb.org/88529 | Broken Link |
http://www.securityfocus.com/bid/56993 | Third Party Advisory |
http://drupalcode.org/project/drupal.git/commitdiff/b47f95d | Exploit Patch |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:074 | Broken Link |
http://www.debian.org/security/2013/dsa-2776 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80795 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2013-01-02 17:55
Updated : 2017-08-28 18:32
NVD link : CVE-2012-5653
Mitre link : CVE-2012-5653
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
debian
- debian_linux
drupal
- drupal