{ "id": "CVE-2013-4230", "sourceIdentifier": "secalert@redhat.com", "published": "2013-08-21T14:55:07.150", "lastModified": "2025-04-11T00:51:21.963", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mm_webform submodule in the Monster Menus module 6.x-6.x before 6.x-6.61 and 7.x-1.x before 7.x-1.13 for Drupal does not properly restrict access to webform submissions, which allows remote authenticated users with the \"Who can read data submitted to this webform\" permission to delete arbitrary submissions via unspecified vectors." }, { "lang": "es", "value": "El submodulo mm_webform en el modulo Monster Menus v6.x-6.x anterior a v6.x-6.61 y v7.x-1.x anterior a v7.x-1.13 para Drupal no restringe adecuadamente el acceso a env\u00edos en formularios web, lo que permite a usuarios remotos autenticados con el permiso \"Who can read data submitted to this webform\" eliminar env\u00edos arbitrarios mediante vectores no especificados." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "baseScore": 6.0, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 6.8, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-264" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.19:*:*:*:*:*:*:*", "matchCriteriaId": "A9E033DF-59CF-498C-A076-BA7DB686188E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.22:*:*:*:*:*:*:*", "matchCriteriaId": "C9C16607-683F-40FC-AA48-012E3E1E83DC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.23:*:*:*:*:*:*:*", "matchCriteriaId": "DA037CFC-79F0-482F-A320-A0FA7EF007F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.24:*:*:*:*:*:*:*", "matchCriteriaId": "51BE24CD-79B4-4AD0-963A-7A76E69BDAAA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.25:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BE243-196E-4391-A390-60BF9CD8A13B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.26:*:*:*:*:*:*:*", "matchCriteriaId": "47FE3A7B-DA7C-4397-819C-1C7E4FB899E3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.27:*:*:*:*:*:*:*", "matchCriteriaId": "7ABEDF32-312E-424B-97E6-6B8DB0813999" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.29:*:*:*:*:*:*:*", "matchCriteriaId": "7DAE4DF9-F3C0-4A9B-A4A9-CF77B8B47A03" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.30:*:*:*:*:*:*:*", "matchCriteriaId": "1FC407A9-65B4-4E51-892D-30F9F29E8D15" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.31:*:*:*:*:*:*:*", "matchCriteriaId": "03A129F5-769D-4A66-B0E8-BE59623780FE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.32:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCE21E-4166-4C6B-860F-4359E46368CB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.33:*:*:*:*:*:*:*", "matchCriteriaId": "F10A3425-FA1F-4BB0-925A-1D014A62F819" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.34:*:*:*:*:*:*:*", "matchCriteriaId": "CDD4080C-CE70-40B4-B5D4-F3D34648B927" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.35:*:*:*:*:*:*:*", "matchCriteriaId": "0C837D15-9083-4D31-BF1A-B781056D2ECA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.36:*:*:*:*:*:*:*", "matchCriteriaId": "D74C691D-F020-4950-ACF0-3E0743F5630A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.37:*:*:*:*:*:*:*", "matchCriteriaId": "F28942C2-B11A-418E-93E1-592283DC21D7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.38:*:*:*:*:*:*:*", "matchCriteriaId": "0745F7A6-2EBE-4BC8-8B13-9C1EC0189D29" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.41:*:*:*:*:*:*:*", "matchCriteriaId": "8845AC79-106D-4B74-89C3-64865A50E2BA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.42:*:*:*:*:*:*:*", "matchCriteriaId": "A3B7B814-D8D2-4B50-81C7-11B3A3210733" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.43:*:*:*:*:*:*:*", "matchCriteriaId": "59FC6D4B-2EFA-4BB8-BCAF-B7CD803E87F0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.44:*:*:*:*:*:*:*", "matchCriteriaId": "4ECD3067-C747-4C2F-B16C-08578DABF5EA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.48:*:*:*:*:*:*:*", "matchCriteriaId": "14B90660-C7E5-432E-9CEF-3DF4AAC52883" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.53:*:*:*:*:*:*:*", "matchCriteriaId": "D871A6E4-77FD-4147-A753-E09553348D4B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.56:*:*:*:*:*:*:*", "matchCriteriaId": "EB39A8F4-FAF2-40EB-A9AB-7261263688FD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.57:*:*:*:*:*:*:*", "matchCriteriaId": "72CA4165-A581-4D31-B880-1DB081629073" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.59:*:*:*:*:*:*:*", "matchCriteriaId": "756BB5DC-0F97-4BD1-A2F2-5487E0B1F437" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:6.x-6.60:*:*:*:*:*:*:*", "matchCriteriaId": "A581EA28-1325-4761-88FC-9E05B26AC2F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "98E0F326-8C25-448E-B775-51A00E94B70C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E988B3D0-0E9F-46A3-942F-5B806C19125E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "545F78EA-A4C8-4A02-9307-A7161341ABB5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "CBC17B5C-B516-4C51-9931-9C61DF551F69" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "87F04C8D-46F8-4011-B8CB-7A2739D73826" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F79729F-DC69-4C20-97FC-82CAD7731C5C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "524A1E8F-F1CB-4028-B664-1E97EA56FDD7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.7:*:*:*:*:*:*:*", "matchCriteriaId": "278CAAEB-C8CE-4BE7-BA48-C353200CCC43" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.8:*:*:*:*:*:*:*", "matchCriteriaId": "8A41C450-BADF-41A8-97D2-16C0B41E3CB9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0A2CA121-6280-4E12-B16E-6731487BAA7F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.10:*:*:*:*:*:*:*", "matchCriteriaId": "BDB655C8-862F-4F4A-95D0-3BE285492936" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.11:*:*:*:*:*:*:*", "matchCriteriaId": "9E9FDD6C-B044-4411-8167-42B90122BDBE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.12:*:*:*:*:*:*:*", "matchCriteriaId": "831B3C4D-0A3A-4F6F-BAF9-D132E4984C02" }, { "vulnerable": true, "criteria": "cpe:2.3:a:monster_menus_module_project:monster_menus:7.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "542F67D5-230B-425D-9F64-B272CA3F01E0" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/54391", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/bid/61711", "source": "secalert@redhat.com" }, { "url": "https://drupal.org/node/2059805", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "https://drupal.org/node/2059807", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "https://drupal.org/node/2059823", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86326", "source": "secalert@redhat.com" }, { "url": "http://secunia.com/advisories/54391", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2013/08/10/1", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/61711", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://drupal.org/node/2059805", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "https://drupal.org/node/2059807", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "https://drupal.org/node/2059823", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86326", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }