Drupal Email Input Filter Module Code Execution Vulnerability
RISK: Medium Risk
A vulnerability has been reported in the Email Input Filter module for Drupal, which could be exploited by remote attackers to compromise a vulnerable system.
Input passed to the Email Input Filter module is not properly sanitised before being used to create content. This can be exploited to inject and execute arbitrary PHP code.
Successful exploitation requires the permission to create content using an input format with the email input filter enabled.
Impact
- Remote Code Execution
System / Technologies affected
- Drupal versions prior to 6.x-1.1
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Update to version 6.x-1.1 or later.
http://drupal.org/node/745390
Vulnerability Identifier
- No CVE information is available
Source
Share with