The Drupal filter_xss_admin function in 5.x before 5.8 and 6.x before 6.3 does not "prevent use of the object HTML tag in administrator input," which has unknown impact and attack vectors, probably related to an insufficient cross-site scripting (XSS) protection mechanism.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/30168 | vdb entry third party advisory |
http://drupal.org/node/280571 | patch vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=454849 | issue tracking third party advisory patch |
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00016.html | third party advisory vendor advisory |
http://secunia.com/advisories/31079 | third party advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00527.html | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2008/07/10/3 | third party advisory mailing list |
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00551.html | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43701 | vdb entry third party advisory |