First published: Tue Jun 07 2005(Updated: )
Unknown vulnerability in the privilege system in Drupal 4.4.0 through 4.6.0, when public registration is enabled, allows remote attackers to gain privileges, due to an "input check" that "is not implemented properly."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Drupal | =4.6.0 | |
Drupal Drupal | =4.5.0 | |
Drupal Drupal | =4.5.2 | |
Drupal Drupal | =4.4.1 | |
Drupal Drupal | =4.5.1 | |
Drupal Drupal | =4.4.2 | |
Drupal Drupal | =4.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-1871 is considered to be high due to the potential for remote attackers to gain unauthorized privileges.
To fix CVE-2005-1871, upgrading to a patched version of Drupal higher than 4.6.0 is recommended.
CVE-2005-1871 affects Drupal versions 4.4.0 to 4.6.0.
Exploitation of CVE-2005-1871 allows remote attackers to gain elevated privileges, potentially compromising website security.
Yes, enabling public registration in Drupal increases the risk associated with CVE-2005-1871, allowing attackers to exploit the vulnerability.