- Advisory ID: DRUPAL-SA-2006-017
- Project: Easylinks 4.7
- Date: 2006-Aug-22
- Security risk: highly critical
- Exploitable from: remote
- Vulnerability: SQL injection, Cross site scripting
Description
Unescaped input is used directly in queries, allowing malicious users to execute SQL injection attacks. This may result in administrator privileges.
It is also possible for a malicious user to insert and execute XSS (Cross Site Scripting), due to lack of validation on output. This may lead to administrator access if certain conditions are met. Learn more about XSS on Wikipedia.
Versions affected
Please check the CVS $Id$ fields in the file easylinks.module to determine whether the version you are running is vulnerable. Versions older than the following (or lacking an ID) are vulnerable:
- $Id: easylinks.module,v 1.5.2.1 2006/08/19 12:02:27 killes Exp $
Drupal core is not affected. If you do not use the contributed Easylinks module, there is nothing you need to do.
Solution
Install the latest version:
See also the Easylinks project page.
Reported by
Jakub Suchy
Contact
The security contact for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.