Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
N/A | CWE-287 | $500 | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | High | Remote | 2006-03-23 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L | 0.02192 | 0.50148 |
------------------------------------------------------------------------ ---- Drupal security advisory DRUPAL-SA-2006-001 ------------------------------------------------------------------------ ---- Advisory ID: DRUPAL-SA-2006-001 Project: Drupal core Date: 2006-03-13 Security risk: less critical Impact: security bypass Where: from remote Vulnerability: bypass access control ------------------------------------------------------------------------ ---- Description ----------- If you use menu.module to create a menu item, the page you point to will be accessible to all, even if it is an admin page. Versions affected ----------------- All Drupal versions before 4.6.6. Solution -------- If you are running Drupal 4.5.x then upgrade to Drupal 4.5.8. If you are running Drupal 4.6.x then upgrade to Drupal 4.6.6. Contact ------- The security contact for Drupal can be reached at security (at) drupal (dot) org [email concealed] or using the form at http://drupal.org/contact. More information is available from http://drupal.org/security or from our security RSS feed http://drupal.org/security/rss.xml. // Uwe Hermann, on behalf of the Drupal Security Team. -- Uwe Hermann http://www.hermann-uwe.de http://www.it-services-uh.de | http://www.crazy-hacks.org http://www.holsham-traders.de | http://www.unmaintained-free-software.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFEFiOfXdVoV3jWIbQRAsXvAKCiF5JVtDb09JS9PAqxURarg51yZACglgnk Pf88QEtOkewPhBf4L+zFPQM= =mtYP -----END PGP SIGNATURE-----
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.