CVE-2015-6659

NameCVE-2015-6659
DescriptionSQL injection vulnerability in the SQL comment filtering system in the Database API in Drupal 7.x before 7.39 allows remote attackers to execute arbitrary SQL commands via an SQL comment.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-3346-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
drupal7 (PTS)jessie (security), jessie7.32-1+deb8u12fixed
stretch (security), stretch7.52-2+deb9u4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
drupal7source(unstable)7.39-1high
drupal7sourcejessie7.32-1+deb8u5highDSA-3346-1
drupal7sourcewheezy7.14-2+deb7u11highDSA-3346-1

Notes

https://www.drupal.org/SA-CORE-2015-003
http://www.openwall.com/lists/oss-security/2015/08/21/5

Search for package or bug name: Reporting problems