Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Drupal Privilege Escalation Vulnerability


Vulnerability Assessment Details

Drupal Privilege Escalation Vulnerability

Vulnerability Assessment Summary
Checks version of Drupal

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a PHP application that is prone to a
privilege escalation issue.

Description :

According to its banner, the version of Drupal installed on the remote
host permits attackers to gain elevated rights, provided public
registration is enabled, due to an improperly-implemented input check.

See also :

http://archives.neohapsis.com/archives/fulldisclosure/2005-06/0010.html

Solution :

Upgrade to Drupal version 4.4.3 / 4.5.3 / 4.6.1 or later.

Network Security Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:H/Au:NR/C:N/A:N/I:P/B:N)

Networks Security ID: 13852

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

1pcs USB 2.0 unique iron man model 16G Enough Memory Stick Flash pen Drive #03
$0.01
1pcs USB 2.0 unique iron man model 16G Enough Memory Stick Flash pen Drive #03 pictureBRAND NEW SEALED Infinitive USB Flash Drive 16GB For PC And Mac
$9.06
BRAND NEW SEALED Infinitive USB Flash Drive 16GB For PC And Mac  pictureSanDisk SDCZ880-256G-G46 Extreme PRO 256GB USB 3.1 Solid State Flash Drive
$133.95
SanDisk SDCZ880-256G-G46 Extreme PRO 256GB USB 3.1 Solid State Flash Drive  pictureKingston DataTraveler 50 16GB USB Flash Drive
$4.0
Kingston DataTraveler 50 16GB USB Flash Drive picture


Discussions

No Discussions have been posted on this vulnerability.