The file upload feature in Drupal 6.x before 6.27 and 7.x before 7.18 allows remote authenticated users to bypass the protection mechanism and execute arbitrary PHP code via a null byte in a file name.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://osvdb.org/88529 | vdb entry broken link |
http://drupalcode.org/project/drupal.git/commitdiff/da8023a | patch exploit |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:074 | vendor advisory broken link |
http://drupal.org/SA-CORE-2012-004 | patch vendor advisory |
http://www.securityfocus.com/bid/56993 | vdb entry third party advisory |
http://drupalcode.org/project/drupal.git/commitdiff/b47f95d | patch exploit |
http://www.debian.org/security/2013/dsa-2776 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2012/12/20/1 | third party advisory mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80795 | vdb entry |