CVE-2008-0577 (CNNVD-200802-024)
中文标题:
drupal project_issue_tracking_module 权限许可和访问控制漏洞
英文标题:
The Project Issue Tracking module 5.x-2.x-dev before 20080130 in the 5.x-2.x series, 5.x-1.2 and ear...
漏洞描述
中文描述:
2008年1月30之前的Drupal 5.x-2.x 系列, 5.x-1.2 及5.x-1.x 系列早期版本, 4.7.x-2.6 及 4.7.x-2.x 系列的早期版本, 还有 4.7.x-1.6 及 4.7.x-1.x series系列的早期版本的Project Issue Tracking module 5.x-2.x-dev(1)在上传模块被激活时并不限制附件的扩展名,这会使远程攻击者可以上传和可能执行任意文件;(2)在文件设计范围内的.html文件上传,这会使远程攻击者可以上传包含任意web脚本或HTML的文件。
英文描述:
The Project Issue Tracking module 5.x-2.x-dev before 20080130 in the 5.x-2.x series, 5.x-1.2 and earlier in the 5.x-1.x series, 4.7.x-2.6 and earlier in the 4.7.x-2.x series, and 4.7.x-1.6 and earlier in the 4.7.x-1.x series for Drupal (1) does not restrict the extensions of attached files when the Upload module is enabled for issue nodes, which allows remote attackers to upload and possibly execute arbitrary files; and (2) accepts the .html extension within the bundled file-upload functionality, which allows remote attackers to upload files containing arbitrary web script or HTML.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| drupal | project_issue_tracking_module | 4.7 | - | - |
cpe:2.3:a:drupal:project_issue_tracking_module:4.7:*:*:*:*:*:*:*
|
| drupal | project_issue_tracking_module | 5.0 | - | - |
cpe:2.3:a:drupal:project_issue_tracking_module:5.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
AV:N/AC:L/Au:N/C:P/I:P/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2008-0577 |
2025-11-11 15:17:58 | 2025-11-11 07:32:50 |
| NVD | nvd_CVE-2008-0577 |
2025-11-11 14:52:33 | 2025-11-11 07:41:36 |
| CNNVD | cnnvd_CNNVD-200802-024 |
2025-11-11 15:09:00 | 2025-11-11 07:49:23 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200802-024
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.4
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']