Miggo Logo

CVE-2011-2715:
Drupal SQL Injection vulnerability

9.8

CVSS Score

Basic Information

EPSS Score
-
Published
4/22/2022
Updated
5/3/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
drupal/corecomposer= 6.20

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper sanitization of SQL identifiers (table/column names) in the Data module. Drupal's database API requires explicit sanitization for identifiers using db_escape_table(), which wasn't properly implemented in query construction functions. The primary vulnerable function data_build_query handles dynamic query generation using user-controlled schema elements, while data_ui_admin_manage_alter processes schema modifications. The high confidence for data_build_query comes from its direct role in SQL assembly, while medium confidence for data_ui_admin_manage_alter is based on typical schema alteration patterns in Drupal modules.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n SQL Inj**tion vuln*r**ility *xists in *rup*l *.** wit* **t* *.x-*.*-*lp**** *u* to insu**i*i*nt s*nitiz*tion o* t**l* n*m*s or *olumn n*m*s.

Reasoning

T** vuln*r**ility st*ms *rom improp*r s*nitiz*tion o* SQL i**nti*i*rs (t**l*/*olumn n*m*s) in t** **t* mo*ul*. *rup*l's **t***s* *PI r*quir*s *xpli*it s*nitiz*tion *or i**nti*i*rs usin* **_*s**p*_t**l*(), w*i** w*sn't prop*rly impl*m*nt** in qu*ry *o