--Fba/0zbH8Xs+Fj9o Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable ---------------------------------------------------------------------------- Drupal security advisory DRUPAL-SA-2006-002 ---------------------------------------------------------------------------- Advisory ID: DRUPAL-SA-2006-002 Project: Drupal core Date: 2006-03-13 Security risk: less critical Impact: cross-site scripting Where: from remote Vulnerability: cross-site scripting ---------------------------------------------------------------------------- Description ----------- Some user input sanity checking was missing. This could lead to possible cross-site scripting (XSS) attacks. XSS can lead to user tracking and theft of accounts and services. Versions affected ----------------- All Drupal versions before 4.6.6. Solution -------- If you are running Drupal 4.5.x then upgrade to Drupal 4.5.8. If you are running Drupal 4.6.x then upgrade to Drupal 4.6.6. Contact ------- The security contact for Drupal can be reached at security@drupal.org or using the form at http://drupal.org/contact. More information is available from http://drupal.org/security or from our security RSS feed http://drupal.org/security/rss.xml. // Uwe Hermann, on behalf of the Drupal Security Team. --=20 Uwe Hermann=20 http://www.hermann-uwe.de http://www.it-services-uh.de | http://www.crazy-hacks.org=20 http://www.holsham-traders.de | http://www.unmaintained-free-software.org --Fba/0zbH8Xs+Fj9o Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFEFiPKXdVoV3jWIbQRAitTAKCIO3aOBy2sVVD2dBs5oSKSeVLLEQCfUWV/ jK6Eed6rQCK6YbKhp6E5XDE= =aqzn -----END PGP SIGNATURE----- --Fba/0zbH8Xs+Fj9o--