First published: Wed Aug 27 2008(Updated: )
Unrestricted file upload vulnerability in the BlogAPI module in Drupal 5.x before 5.10 and 6.x before 6.4 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, which is not validated.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal | =5.4 | |
Drupal | =6.2 | |
Drupal | =5.2 | |
Drupal | =5.7 | |
Drupal | =5.0 | |
Drupal | =6.1 | |
Drupal | =5.6 | |
Drupal | =5.1 | |
Drupal | =5.5 | |
Drupal | =6.0 | |
Drupal | =5.9 | |
Drupal | =5.8 | |
Drupal | =5.3 | |
Drupal | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3742 is considered a critical severity vulnerability due to its potential for remote code execution.
To fix CVE-2008-3742, upgrade to Drupal version 5.10 or higher and 6.4 or higher.
CVE-2008-3742 affects Drupal versions 5.0 to 5.9 and 6.0 to 6.3.
CVE-2008-3742 can be exploited by remote authenticated users who can upload files.
The impact of CVE-2008-3742 is the ability for attackers to execute arbitrary code on the server by uploading malicious files.