cvelist/2012/2xxx/CVE-2012-2073.json
2019-03-18 05:23:30 +00:00

97 lines
3.2 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2073",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Bundle copy module 7.x-1.x before 7.x-1.1 for Drupal does not check for the \"use PHP for settings\" permission while importing settings, which allows remote authenticated users with certain permissions to execute arbitrary PHP code via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://drupal.org/node/1506420",
"refsource": "MISC",
"url": "http://drupal.org/node/1506420"
},
{
"name": "80676",
"refsource": "OSVDB",
"url": "http://osvdb.org/80676"
},
{
"name": "bundlecopy-usephp-code-execution(74439)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74439"
},
{
"name": "48626",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48626"
},
{
"name": "[oss-security] 20120406 CVE's for Drupal Contrib 2012 001 through 057 (67 new CVE assignments)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2012/04/07/1"
},
{
"name": "52811",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/52811"
},
{
"name": "http://drupal.org/node/1506166",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/1506166"
},
{
"name": "http://drupalcode.org/project/bundle_copy.git/commit/299bdca",
"refsource": "CONFIRM",
"url": "http://drupalcode.org/project/bundle_copy.git/commit/299bdca"
}
]
}
}