CVE-2008-6171
Published Feb 19, 2009
Last updated 7 years ago
Overview
- Description
- includes/bootstrap.inc in Drupal 5.x before 5.12 and 6.x before 6.6, when the server is configured for "IP-based virtual hosts," allows remote attackers to include and execute arbitrary files via the HTTP Host header.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-16
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDBE79A6-5762-4A7C-8FDA-C11FFFDCFC9B" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5BCAB7B-DF79-4DB8-A5C4-731F251A02A2" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5AEAB73-F7A9-4C62-BCB6-1028DAF149DB" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF34F79B-6B1B-45CA-82BA-24D4254B26DF" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C4C5857-3690-4D74-B135-B6AB7E766FB7" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EC12E03-C4B0-4B2F-B70B-0EB19C450AB2" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD50E551-7609-45EF-B2C6-3873D9CF8DB6" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "327712EE-8E9B-4A62-94A8-504C9CD2DE97" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C4FC56B-0289-411C-88BF-144D7338D456" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED3ECEA7-E6D3-43E8-A281-56C7F95A0B7F" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28BE4DF7-6884-49BA-99D0-FCAE6DB75242" }, { "criteria": "cpe:2.3:a:drupal:drupal:5.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE7287CD-A5FB-4428-8656-F466A8E47463" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFE07AAD-9207-4C5F-A108-7F7753E4F48C" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52D8F291-CBEB-4EAA-9388-F63066A2DFA0" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0BD5AEC-F20E-4E53-AF3F-2C60BA2D2171" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5D76BC5-0409-4D78-8064-A78B923E9167" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB73B2E1-2554-4CA2-9C82-B694509CE43A" }, { "criteria": "cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A7827ED-D8AF-42B3-B514-39A04EB0879A" } ], "operator": "OR" } ] } ]