2024-12-08 03:06:42 +00:00

278 lines
9.3 KiB
JSON

{
"id": "CVE-2010-3022",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-08-16T20:00:03.153",
"lastModified": "2024-11-21T01:17:53.470",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Performance logging module in the Devel module 5.x before 5.x-1.3 and 6.x before 6.x-1.21 for Drupal allows remote authenticated users, with add url aliases and report access permissions, to inject arbitrary web script or HTML via crafted node paths in a URL."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo \"Performance logging\" del m\u00f3dulo Devel v5.x anteriores a la v5.x-1.3 y v6.x anteriores a la v6.x-1.21 de Drupal permite a usuarios autenticados remotos, con permisos de acceso \"add url aliases\" y \"report\", inyectar c\u00f3digo de script o HTML de su elecci\u00f3n a trav\u00e9s de rutas de nodo modificadas en una URL."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5x-1.2",
"matchCriteriaId": "2D2A0A4B-C98C-4009-9C4D-6B97AF93DAE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.x-1.20",
"matchCriteriaId": "28598F8A-82A9-4520-9277-9729547E7AAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:5.x-1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46E36EBD-7511-4CE5-B0B1-273B819F4B74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:5.x-1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C25C771D-7AB0-42D7-8B5E-6DCD95C05B50"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:5.x-1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B4B1E6E6-1599-49E6-9ADA-3E6B436FDDE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F35D9CF-45FB-49CF-8246-584FD30D3F80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA3DFF2-7F61-41B0-92B9-7C3F957A5CF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A9EE663F-EC06-448E-9682-E0782396C0AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5ABA62-B08B-4C0E-A54C-B2557D209A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "42539489-E85A-413A-8196-E726B277776F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DA4C9B4B-41C8-4414-8484-E29B8A6EB945"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2A1EC4C7-2327-4C5D-BB20-A8C35A193659"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BE9E10E1-7F0A-45A1-B357-075F924B4CD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "75060E0E-A937-4DA2-A12B-297CC8A85A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2E24BD37-2BBE-48C2-94F0-9BD667ABAAEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "BB767686-6AF3-4984-8B1C-482E3BCEA10D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "DE203571-F380-4784-875B-2BC6B3CD5F8F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "CE5ED195-87D9-42F0-AAB2-09C890C58A4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8943480E-5723-40B7-82B2-724F132C8911"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "E466D2D8-2689-4568-B71E-F672B74C58F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "14203628-6B66-455F-BFE3-498E521FB2EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C89017C5-2C36-4BA6-BA5B-75F8D9776E35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "04F0CC90-0F52-46DD-B142-5E9CF57E433C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "71B21D8A-2E51-4967-8F8F-3E385EB68A63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:drupal:devel_module:6.x-1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "FC4266FD-FA2D-4B3B-9F8F-867B93B08E5A"
}
]
}
]
}
],
"references": [
{
"url": "http://drupal.org/node/874116",
"source": "cve@mitre.org"
},
{
"url": "http://drupal.org/node/874130",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://drupal.org/node/874132",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://osvdb.org/66889",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/40844",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/42231",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60905",
"source": "cve@mitre.org"
},
{
"url": "http://drupal.org/node/874116",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://drupal.org/node/874130",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://drupal.org/node/874132",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://osvdb.org/66889",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/40844",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/42231",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60905",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}