First published: Thu Jul 10 2008(Updated: )
Drupal security team released an advisory describing multiple security issues affecting Drupal 5.x and 6.x - SA-2008-044: <a href="http://drupal.org/node/280571">http://drupal.org/node/280571</a> Advisory includes: - cross site scripting issues - cross site request forgeries - session fixation issues - SQL injection Fixed in upstream versions: 5.8 and 6.3 Upstream patches for 5.7/6.2: <a href="http://drupal.org/files/sa-2008-044/SA-2008-044-5.7.patch">http://drupal.org/files/sa-2008-044/SA-2008-044-5.7.patch</a> <a href="http://drupal.org/files/sa-2008-044/SA-2008-044-6.2.patch">http://drupal.org/files/sa-2008-044/SA-2008-044-6.2.patch</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/drupal/drupal | >=6.0<6.3 | 6.3 |
Drupal | >=6.0<6.3 | |
Red Hat Fedora | =8 | |
Red Hat Fedora | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3218 is classified as a moderate severity vulnerability due to multiple security issues including cross site scripting and session fixation.
To fix CVE-2008-3218, upgrade your Drupal installation to version 6.3 or later.
CVE-2008-3218 affects Drupal versions 5.x and 6.x prior to version 6.3.
CVE-2008-3218 involves multiple security issues including cross site scripting, cross site request forgery, and session fixation vulnerabilities.
Yes, the Drupal security team released advisory SA-2008-044, which details the vulnerabilities in CVE-2008-3218.