First published: Sat Dec 03 2005(Updated: )
Interpretation conflict in file.inc in Drupal 4.5.0 through 4.5.5 and 4.6.0 through 4.6.3 allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF or JPEG file extension, which causes the HTML to be executed by a victim who views the file in Internet Explorer as a result of CVE-2005-3312. NOTE: it could be argued that this vulnerability is due to a design flaw in Internet Explorer and the proper fix should be in that browser; if so, then this should not be treated as a vulnerability in Drupal.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Drupal | =4.6.0 | |
Drupal Drupal | =4.5.4 | |
Drupal Drupal | =4.5.0 | |
Drupal Drupal | =4.5.2 | |
Drupal Drupal | =4.6.2 | |
Drupal Drupal | =4.5.1 | |
Drupal Drupal | =4.6.3 | |
Drupal Drupal | =4.5.5 | |
Drupal Drupal | =4.6.1 | |
Drupal Drupal | =4.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3975 is classified as a high severity vulnerability due to its potential for remote code execution via malicious file uploads.
To remediate CVE-2005-3975, upgrade your Drupal installation to version 4.6.4 or later, or 4.5.6 or later.
CVE-2005-3975 affects Drupal versions 4.5.0 to 4.5.5 and 4.6.0 to 4.6.3.
Yes, CVE-2005-3975 can be exploited by remote authenticated users with limited privileges.
CVE-2005-3975 can lead to the injection of arbitrary HTML and JavaScript code, posing a risk of cross-site scripting attacks on users viewing affected files.