First published: Mon Aug 24 2015(Updated: )
SQL injection vulnerability in the SQL comment filtering system in the Database API in Drupal 7.x before 7.39 allows remote attackers to execute arbitrary SQL commands via an SQL comment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal | =7.0 | |
Drupal | =7.0-alpha1 | |
Drupal | =7.0-alpha2 | |
Drupal | =7.0-alpha3 | |
Drupal | =7.0-alpha4 | |
Drupal | =7.0-alpha5 | |
Drupal | =7.0-alpha6 | |
Drupal | =7.0-alpha7 | |
Drupal | =7.0-beta1 | |
Drupal | =7.0-beta2 | |
Drupal | =7.0-beta3 | |
Drupal | =7.0-dev | |
Drupal | =7.0-rc1 | |
Drupal | =7.0-rc2 | |
Drupal | =7.0-rc3 | |
Drupal | =7.0-rc4 | |
Drupal | =7.1 | |
Drupal | =7.2 | |
Drupal | =7.3 | |
Drupal | =7.4 | |
Drupal | =7.5 | |
Drupal | =7.6 | |
Drupal | =7.7 | |
Drupal | =7.8 | |
Drupal | =7.9 | |
Drupal | =7.10 | |
Drupal | =7.11 | |
Drupal | =7.12 | |
Drupal | =7.13 | |
Drupal | =7.14 | |
Drupal | =7.15 | |
Drupal | =7.16 | |
Drupal | =7.17 | |
Drupal | =7.18 | |
Drupal | =7.19 | |
Drupal | =7.20 | |
Drupal | =7.21 | |
Drupal | =7.22 | |
Drupal | =7.23 | |
Drupal | =7.24 | |
Drupal | =7.25 | |
Drupal | =7.26 | |
Drupal | =7.27 | |
Drupal | =7.28 | |
Drupal | =7.29 | |
Drupal | =7.30 | |
Drupal | =7.33 | |
Drupal | =7.34 | |
Drupal | =7.35 | |
Drupal | =7.36 | |
Drupal | =7.37 | |
Drupal | =7.38 | |
Drupal | =7.x-dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6659 is considered a critical vulnerability due to its potential to allow arbitrary SQL execution by remote attackers.
To fix CVE-2015-6659, update your Drupal installation to version 7.39 or later.
CVE-2015-6659 affects all versions of Drupal 7.x prior to 7.39.
CVE-2015-6659 is an SQL injection vulnerability within Drupal's Database API.
Yes, CVE-2015-6659 can be exploited remotely by attackers without authentication.