Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6385

Опубликовано: 07 дек. 2013
Источник: debian
EPSS Низкий

Описание

The form API in Drupal 6.x before 6.29 and 7.x before 7.24, when used with unspecified third-party modules, performs form validation even when CSRF validation has failed, which might allow remote attackers to trigger application-specific impacts such as arbitrary code execution via application-specific vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
drupal6removedpackage
drupal7fixed7.24-1package

Примечания

  • https://drupal.org/SA-CORE-2013-003

EPSS

Процентиль: 85%
0.02471
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

The form API in Drupal 6.x before 6.29 and 7.x before 7.24, when used with unspecified third-party modules, performs form validation even when CSRF validation has failed, which might allow remote attackers to trigger application-specific impacts such as arbitrary code execution via application-specific vectors.

nvd
около 12 лет назад

The form API in Drupal 6.x before 6.29 and 7.x before 7.24, when used with unspecified third-party modules, performs form validation even when CSRF validation has failed, which might allow remote attackers to trigger application-specific impacts such as arbitrary code execution via application-specific vectors.

github
больше 3 лет назад

The form API in Drupal 6.x before 6.29 and 7.x before 7.24, when used with unspecified third-party modules, performs form validation even when CSRF validation has failed, which might allow remote attackers to trigger application-specific impacts such as arbitrary code execution via application-specific vectors.

EPSS

Процентиль: 85%
0.02471
Низкий