Drupal FileField Source Module < 6.x-1.2 Arbitrary Code Execution

Medium Nessus Network Monitor Plugin ID 5636

Synopsis

The remote web server is hosting a web application that is vulnerable to a remote code execution attack.

Description

The remote web server hosts a Drupal install that uses the FileField Source module.

Versions of FileField Sources earlier than 6.x-1.2 are potentially affected by a remote code execution vulnerability because the application fails to properly sanitize the file extensions of files that have been transferred from remote servers.

Solution

Upgrade to Drupal FileField Sources module 6.x-1.2 or later.

See Also

http://drupal.org/node/880386

Plugin Details

Severity: Medium

ID: 5636

Family: CGI

Published: 2010/08/12

Modified: 2016/01/21

Dependencies: 1442

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.5

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS3#AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 2010/08/11

Vulnerability Publication Date: 2010/08/11

Reference Information

BID: 42390