First published: Fri Jul 18 2008(Updated: )
The Drupal filter_xss_admin function in 5.x before 5.8 and 6.x before 6.3 does not "prevent use of the object HTML tag in administrator input," which has unknown impact and attack vectors, probably related to an insufficient cross-site scripting (XSS) protection mechanism.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal | >=5.0<5.8 | |
Drupal | >=6.0<6.3 | |
Fedora | =8 | |
Fedora | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3219 is considered a moderate severity vulnerability due to its potential for cross-site scripting (XSS) exploits.
To fix CVE-2008-3219, upgrade Drupal to version 5.8 or later for 5.x, or to version 6.3 or later for 6.x.
CVE-2008-3219 affects Drupal versions prior to 5.8 in the 5.x series and versions prior to 6.3 in the 6.x series.
Attackers can exploit CVE-2008-3219 to execute arbitrary JavaScript code, leading to possible data theft or session hijacking through XSS.
CVE-2008-3219 is not a concern for current Drupal installations if they have been updated to the latest versions that address this vulnerability.