Security Features Affecting drupal7 package, versions <7.32-1+deb8u6


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.35% (72nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN8-DRUPAL7-404395
  • published12 Apr 2016
  • disclosed12 Apr 2016

Introduced: 12 Apr 2016

CVE-2016-3163  (opens in a new tab)
CWE-254  (opens in a new tab)

How to fix?

Upgrade Debian:8 drupal7 to version 7.32-1+deb8u6 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream drupal7 package and not the drupal7 package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

The XML-RPC system in Drupal 6.x before 6.38 and 7.x before 7.43 might make it easier for remote attackers to conduct brute-force attacks via a large number of calls made at once to the same method.