Vulnerability Details : CVE-2008-3219
The Drupal filter_xss_admin function in 5.x before 5.8 and 6.x before 6.3 does not "prevent use of the object HTML tag in administrator input," which has unknown impact and attack vectors, probably related to an insufficient cross-site scripting (XSS) protection mechanism.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2008-3219
Probability of exploitation activity in the next 30 days: 0.26%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 63 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-3219
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2008-3219
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-3219
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/43701
Third Party Advisory;VDB Entry
-
http://drupal.org/node/280571
Patch;Vendor Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00551.html
Third Party Advisory
-
http://www.securityfocus.com/bid/30168
Third Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2008/07/10/3
Mailing List;Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00527.html
Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00016.html
Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=454849
Issue Tracking;Patch;Third Party Advisory
Products affected by CVE-2008-3219
- cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*