First published: Fri Oct 05 2007(Updated: )
Cross-site scripting (XSS) vulnerability in the subscription functionality in the Project issue tracking module before 4.7.x-1.5, 4.7.x-2.x before 4.7.x-2.5, and 5.x-1.x before 5.x-1.1 for Drupal allows remote authenticated users with project create or edit permissions to inject arbitrary web script or HTML via unspecified vectors involving a (1) individual or (2) overview form.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Drupal Project Issue Tracking | =4.7_2.1 | |
Drupal Drupal Project Issue Tracking | =5.0_0.1 | |
Drupal Drupal Project Issue Tracking | =4.7_1.2 | |
Drupal Drupal Project Issue Tracking | =4.7_2.0 | |
Drupal Drupal Project Issue Tracking | =4.7_1.0 | |
Drupal Drupal Project Issue Tracking | =4.7_2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5228 has a medium severity level as it allows cross-site scripting (XSS) vulnerabilities in affected versions of the Drupal Project issue tracking module.
To fix CVE-2007-5228, update the Drupal Project issue tracking module to version 4.7.x-1.5, 4.7.x-2.5, or 5.x-1.1 or later.
Remote authenticated users with project create or edit permissions are affected by CVE-2007-5228.
CVE-2007-5228 is classified as a cross-site scripting (XSS) vulnerability.
CVE-2007-5228 exists in Drupal versions before 4.7.x-1.5, 4.7.x-2.5, and 5.x-1.1.