7.4 High
AI Score
Confidence
Low
6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.012 Low
EPSS
Percentile
85.0%
The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 7.0 | |
debian_linux | eq | 6.0 | |
drupal | eq | 7.0 alpha5 | |
drupal | eq | 7.0 dev | |
drupal | eq | 7.0 alpha7 | |
drupal | eq | 7.16 | |
drupal | eq | 7.0 rc2 | |
drupal | eq | 7.15 | |
drupal | eq | 7.0 rc4 | |
drupal | eq | 7.0 beta2 |
drupalcode.org/project/drupal.git/commitdiff/b47f95d
drupalcode.org/project/drupal.git/commitdiff/da8023a
osvdb.org/88529
www.debian.org/security/2013/dsa-2776
www.mandriva.com/security/advisories?name=MDVSA-2013:074
www.openwall.com/lists/oss-security/2012/12/20/1
www.securityfocus.com/bid/56993
drupal.org/SA-CORE-2012-004
exchange.xforce.ibmcloud.com/vulnerabilities/80795