Drupal FileField Source Module < 6.x-1.2 Arbitrary Code Execution

medium Nessus Network Monitor Plugin ID 5636

Synopsis

The remote web server is hosting a web application that is vulnerable to a remote code execution attack.

Description

The remote web server hosts a Drupal install that uses the FileField Source module.

Versions of FileField Sources earlier than 6.x-1.2 are potentially affected by a remote code execution vulnerability because the application fails to properly sanitize the file extensions of files that have been transferred from remote servers.

Solution

Upgrade to Drupal FileField Sources module 6.x-1.2 or later.

See Also

http://drupal.org/node/880386

Plugin Details

Severity: Medium

ID: 5636

Family: CGI

Published: 8/12/2010

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 8/11/2010

Vulnerability Publication Date: 8/11/2010

Reference Information

BID: 42390