Skip to main content

Drupal Email Input Filter Module Code Execution Vulnerability

Last Update Date: 28 Jan 2011 Release Date: 19 Mar 2010 5249 Views

RISK: Medium Risk

A vulnerability has been reported in the Email Input Filter module for Drupal, which could be exploited by remote attackers to compromise a vulnerable system.

Input passed to the Email Input Filter module is not properly sanitised before being used to create content. This can be exploited to inject and execute arbitrary PHP code.

Successful exploitation requires the permission to create content using an input format with the email input filter enabled.


Impact

  • Remote Code Execution

System / Technologies affected

  • Drupal versions prior to 6.x-1.1

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

Update to version 6.x-1.1 or later.
http://drupal.org/node/745390


Vulnerability Identifier

  • No CVE information is available

Source