|
|||
Rule General Information |
---|
Release Date: | 2021-12-16 | |
Rule Name: | Drupal Core file_create_filename Stored Cross-Site Scripting Vulnerability (CVE-2019-6341) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | In Drupal 7 versions prior to 7.65; Drupal 8.6 versions prior to 8.6.13;Drupal 8.5 versions prior to 8.5.14. Under certain circumstances the File module/subsystem allows a malicious user to upload a file that can trigger a cross-site scripting (XSS) vulnerability. | |
Impact: | An attacker can conduct a cross-site scripting attack to inject malicious client-side scripts into web pages viewed by other users, or to bypass access controls such as the same-origin policy, if affected version is installed. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://lists.debian.org/debian-lts-announce/2019/04/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWHF4LALNBZCXMITWWVWKY3PNVYTM3N7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4KTET2PTSIS3ZZ4SGBRQEN6CCLV5SYX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNTLCBAN6T7WYR5C4TNEYQD65IIR3V4P/ |
|
Solutions |
---|
The vendor has released upgrade patches to fix vulnerabilities, please visit: https://www.drupal.org/sa-core-2019-004 |