Vulnerability Details : CVE-2014-3453
Eval injection vulnerability in the flag_import_form_validate function in includes/flag.export.inc in the Flag module 7.x-3.0, 7.x-3.5, and earlier for Drupal allows remote authenticated administrators to execute arbitrary PHP code via the "Flag import code" text area to admin/structure/flags/import. NOTE: this issue could also be exploited by other attackers if the administrator ignores a security warning on the permissions assignment page.
Exploit prediction scoring system (EPSS) score for CVE-2014-3453
Probability of exploitation activity in the next 30 days: 0.44%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 71 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3453
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST |
CWE ids for CVE-2014-3453
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3453
-
http://www.openwall.com/lists/oss-security/2014/05/12/2
oss-security - Re: CVE request: Drupal Flag 7.x-3.5 Module Vulnerability report: Arbitrary code execution due to improper input handling in flag importer
-
http://seclists.org/fulldisclosure/2014/May/44
Full Disclosure: Drupal Flag 7.x-3.5 Module Vulnerability report: Arbitrary code execution due to improper input handling in flag importerExploit
-
http://www.securityfocus.com/bid/67318
Drupal Flag Module CVE-2014-3453 Arbitrary PHP Code Execution Vulnerability
-
https://bugzilla.redhat.com/show_bug.cgi?id=1096604
1096604 – (CVE-2014-3453) CVE-2014-3453 drupal6-flag: code execution flaw in flag importer
Products affected by CVE-2014-3453
- cpe:2.3:a:flag_module_project:flag:*:*:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.x:dev:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.1:*:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.0:-:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.0:rc1:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.0:beta1:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.3:*:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha3:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha1:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.4:*:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.2:*:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha4:*:*:*:drupal:*:*
- cpe:2.3:a:flag_module_project:flag:7.x-3.0:alpha2:*:*:*:drupal:*:*