Vulnerable Systems:
* Drupal 5.x before Drupal 5.3
The Drupal installer allows any visitor to provide credentials for a database when the site's own database is not reachable. This allows attackers to run arbitrary code on the site's server.
An immediate workaround is the removal of the file install.php in the Drupal root directory.
Vendor Status:
Drupal issued an update for this vulnerability