- Advisory ID: DRUPAL-SA-2006-027
- Project: Extended Tracker (xtracker) 4.7
- Date: 2006-Oct-26
- Security risk: highly critical
- Exploitable from: remote
- Vulnerability: SQL injection
Description
The contributed module Extended Tracker (xtracker) accepts parameters from URLs and uses those unescaped in SQL queries, allowing malicious users to execute SQL injection attacks. This may result in them gaining administrator privileges.
Versions affected
Please check the CVS $Id$ fields in the file xtracker.module to determine whether the version you are running is vulnerable. Versions older than the following (or lacking an ID) are vulnerable:
- $Id: xtracker.module,v 1.5.2.1 2006/10/24 18:47:41 kbahey Exp $
Version 4.6 of the xtracker module is not vulnerable. Drupal core is not affected. If you do not use the contributed xtracker module, there is nothing you need to do.
Solution
Install the latest version:
See also the Extended Tracker project page.
Reported by
The Drupal security team.
Contact
The security contact for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.