First published: Wed Oct 29 2008(Updated: )
The node module API in Drupal 5.x before 5.11 allows remote attackers to bypass node validation and have unspecified other impact via unknown vectors related to contributed modules.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/drupal/drupal | >=5.0<5.11 | 5.11 |
Drupal | =5.4 | |
Drupal | =5.2 | |
Drupal | =5.7 | |
Drupal | =5.0-rc2 | |
Drupal | =5.0 | |
Drupal | <=5.10 | |
Drupal | =5.0-rc1 | |
Drupal | =5.6 | |
Drupal | =5.0-beta2 | |
Drupal | =5.1 | |
Drupal | =5.5 | |
Drupal | =5.9 | |
Drupal | =5.8 | |
Drupal | =5.3 | |
Drupal | =5.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4793 is considered a moderate severity vulnerability.
To fix CVE-2008-4793, upgrade your Drupal installation to version 5.11 or later.
CVE-2008-4793 affects Drupal versions 5.0 through 5.10.
Yes, CVE-2008-4793 allows remote attackers to bypass node validation, potentially leading to unauthorized access.
CVE-2008-4793 has unspecified impact related to contributed modules, which may include data exposure or system compromise.