First published: Thu Mar 29 2018(Updated: )
The Storage API module 7.x before 7.x-1.6 for Drupal might allow remote attackers to execute arbitrary code by leveraging failure to update .htaccess file contents after SA-CORE-2013-003.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Storage API | =7.x-1.0 | |
Storage API | =7.x-1.1 | |
Storage API | =7.x-1.2 | |
Storage API | =7.x-1.3 | |
Storage API | =7.x-1.4 | |
Storage API | =7.x-1.5 | |
Storage API | =7.x-1.x-dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5170 has a high severity rating due to its potential to allow remote code execution.
To fix CVE-2014-5170, you should update the Storage API module to version 7.x-1.6 or later.
CVE-2014-5170 affects Drupal Storage API versions 7.x-1.0 through 7.x-1.5.
CVE-2014-5170 can be exploited by remote attackers who leverage vulnerabilities in the .htaccess file handling.
Yes, CVE-2014-5170 can lead to data breaches as it allows execution of arbitrary code on affected systems.