2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2013-4230" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2013-08-21T14:55:07.150" ,
2025-04-11 02:06:08 +00:00
"lastModified" : "2025-04-11T00:51:21.963" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The mm_webform submodule in the Monster Menus module 6.x-6.x before 6.x-6.61 and 7.x-1.x before 7.x-1.13 for Drupal does not properly restrict access to webform submissions, which allows remote authenticated users with the \"Who can read data submitted to this webform\" permission to delete arbitrary submissions via unspecified vectors."
} ,
{
"lang" : "es" ,
"value" : "El submodulo mm_webform en el modulo Monster Menus v6.x-6.x anterior a v6.x-6.61 y v7.x-1.x anterior a v7.x-1.13 para Drupal no restringe adecuadamente el acceso a env\u00edos en formularios web, lo que permite a usuarios remotos autenticados con el permiso \"Who can read data submitted to this webform\" eliminar env\u00edos arbitrarios mediante vectores no especificados."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:S/C:P/I:P/A:P" ,
2024-11-22 19:15:24 +00:00
"baseScore" : 6.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 19:15:24 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 6.8 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-264"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.19:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9E033DF-59CF-498C-A076-BA7DB686188E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C9C16607-683F-40FC-AA48-012E3E1E83DC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DA037CFC-79F0-482F-A320-A0FA7EF007F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51BE24CD-79B4-4AD0-963A-7A76E69BDAAA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.25:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB9BE243-196E-4391-A390-60BF9CD8A13B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.26:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "47FE3A7B-DA7C-4397-819C-1C7E4FB899E3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7ABEDF32-312E-424B-97E6-6B8DB0813999"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.29:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7DAE4DF9-F3C0-4A9B-A4A9-CF77B8B47A03"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FC407A9-65B4-4E51-892D-30F9F29E8D15"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "03A129F5-769D-4A66-B0E8-BE59623780FE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.32:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BBCE21E-4166-4C6B-860F-4359E46368CB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.33:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F10A3425-FA1F-4BB0-925A-1D014A62F819"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.34:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CDD4080C-CE70-40B4-B5D4-F3D34648B927"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.35:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C837D15-9083-4D31-BF1A-B781056D2ECA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.36:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D74C691D-F020-4950-ACF0-3E0743F5630A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.37:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F28942C2-B11A-418E-93E1-592283DC21D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.38:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0745F7A6-2EBE-4BC8-8B13-9C1EC0189D29"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8845AC79-106D-4B74-89C3-64865A50E2BA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.42:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A3B7B814-D8D2-4B50-81C7-11B3A3210733"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.43:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "59FC6D4B-2EFA-4BB8-BCAF-B7CD803E87F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.44:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4ECD3067-C747-4C2F-B16C-08578DABF5EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.48:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "14B90660-C7E5-432E-9CEF-3DF4AAC52883"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.53:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D871A6E4-77FD-4147-A753-E09553348D4B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.56:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB39A8F4-FAF2-40EB-A9AB-7261263688FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.57:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "72CA4165-A581-4D31-B880-1DB081629073"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.59:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "756BB5DC-0F97-4BD1-A2F2-5487E0B1F437"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.60:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A581EA28-1325-4761-88FC-9E05B26AC2F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98E0F326-8C25-448E-B775-51A00E94B70C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E988B3D0-0E9F-46A3-942F-5B806C19125E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "545F78EA-A4C8-4A02-9307-A7161341ABB5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CBC17B5C-B516-4C51-9931-9C61DF551F69"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "87F04C8D-46F8-4011-B8CB-7A2739D73826"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9F79729F-DC69-4C20-97FC-82CAD7731C5C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "524A1E8F-F1CB-4028-B664-1E97EA56FDD7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "278CAAEB-C8CE-4BE7-BA48-C353200CCC43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8A41C450-BADF-41A8-97D2-16C0B41E3CB9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A2CA121-6280-4E12-B16E-6731487BAA7F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BDB655C8-862F-4F4A-95D0-3BE285492936"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E9FDD6C-B044-4411-8167-42B90122BDBE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "831B3C4D-0A3A-4F6F-BAF9-D132E4984C02"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*" ,
"matchCriteriaId" : "542F67D5-230B-425D-9F64-B272CA3F01E0"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8B1170D-AD33-4C7A-892D-63AC71B032CF"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/54391" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.openwall.com/lists/oss-security/2013/08/10/1" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/61711" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://drupal.org/node/2059805" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://drupal.org/node/2059807" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://drupal.org/node/2059823" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86326" ,
"source" : "secalert@redhat.com"
2024-11-22 19:15:24 +00:00
} ,
{
"url" : "http://secunia.com/advisories/54391" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2013/08/10/1" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/61711" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://drupal.org/node/2059805" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://drupal.org/node/2059807" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://drupal.org/node/2059823" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86326" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}