CVE-2008-3219

The Drupal filter_xss_admin function in 5.x before 5.8 and 6.x before 6.3 does not "prevent use of the object HTML tag in administrator input," which has unknown impact and attack vectors, probably related to an insufficient cross-site scripting (XSS) protection mechanism.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*

History

15 Apr 2021, 13:49

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : unknown
v2 : 4.3
v3 : unknown
CPE cpe:2.3:a:drupal:drupal:5:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:6:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/43701 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/43701 - Third Party Advisory, VDB Entry
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00016.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00016.html - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/30168 - (BID) http://www.securityfocus.com/bid/30168 - Third Party Advisory, VDB Entry
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00527.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00527.html - Third Party Advisory
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00551.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00551.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/31079 - (SECUNIA) http://secunia.com/advisories/31079 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2008/07/10/3 - (MLIST) http://www.openwall.com/lists/oss-security/2008/07/10/3 - Mailing List, Third Party Advisory
References (CONFIRM) http://drupal.org/node/280571 - Patch (CONFIRM) http://drupal.org/node/280571 - Patch, Vendor Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=454849 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=454849 - Issue Tracking, Patch, Third Party Advisory
CWE CWE-264 CWE-79

Information

Published : 2008-07-18 16:41

Updated : 2023-12-10 10:51


NVD link : CVE-2008-3219

Mitre link : CVE-2008-3219

CVE.ORG link : CVE-2008-3219


JSON object : View

Products Affected

drupal

  • drupal

fedoraproject

  • fedora
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')