mirror of
https://git.FreeBSD.org/ports.git
synced 2025-01-20 08:27:15 +00:00
Document drupal -- SQL injection vulnerability
Submitted by: Nick Hilliard <nick at netability dot ie>
This commit is contained in:
parent
856b6e9e78
commit
120e3e0e05
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=203333
@ -34,6 +34,43 @@ Note: Please add new entries to the beginning of this file.
|
||||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="fa708908-a8c7-11dc-b41d-000fb5066b20">
|
||||
<topic>drupal -- SQL injection vulnerability</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>drupal5</name>
|
||||
<range><lt>5.4</lt></range>
|
||||
</package>
|
||||
<package>
|
||||
<name>drupal4</name>
|
||||
<range><lt>4.7.9</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>The Drupal Project reports:</p>
|
||||
<blockquote cite="http://drupal.org/node/198162">
|
||||
<p>The function taxonomy_select_nodes() directly injects variables
|
||||
into SQL queries instead of using placeholders. While taxonomy
|
||||
module itself validates the input passed to
|
||||
taxonomy_select_nodes(), this is a weakness in Drupal core.
|
||||
Several contributed modules, such as taxonomy_menu, ajaxLoader,
|
||||
and ubrowser, directly pass user input to taxonomy_select_nodes(),
|
||||
enabling SQL injection attacks by anonymous users.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2007-6299</cvename>
|
||||
<url>http://drupal.org/node/198162</url>
|
||||
<url>http://secunia.com/advisories/27932/</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2007-12-05</discovery>
|
||||
<entry>2007-12-12</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="ffcbd42d-a8c5-11dc-bec2-02e0185f8d72">
|
||||
<topic>samba -- buffer overflow vulnerability</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user