First published: Wed Dec 20 2006(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Drupal (1) Project Issue Tracking 4.7.x-1.0 and 4.7.x-2.0, and (2) Project 4.6.x-1.0, 4.7.x-1.0, and 4.7.x-2.0 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, which do not use the check_plain function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal | =4.7 | |
Drupal | =4.7_1.0 | |
Drupal | =4.7_2.0 | |
Drupal | =4.7_1.0 | |
Drupal | =4.6 | |
Drupal | =4.7_2.0 | |
Drupal | =4.6_1.0 | |
=4.6 | ||
=4.6_1.0 | ||
=4.7 | ||
=4.7_1.0 | ||
=4.7_2.0 | ||
=4.7_1.0 | ||
=4.7_2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-6646 is classified as moderate due to its potential for exploitation via cross-site scripting.
To fix CVE-2006-6646, ensure that all user inputs are properly sanitized using the check_plain function in Drupal.
CVE-2006-6646 affects Drupal versions 4.6.x and 4.7.x, specifically 4.6.1, 4.7.1, and the issue tracking versions 4.7.2.
CVE-2006-6646 can enable remote attackers to conduct cross-site scripting (XSS) attacks, allowing them to inject arbitrary web scripts or HTML.
CVE-2006-6646 poses a risk only for outdated Drupal installations, and should be mitigated by updating to the latest versions.