2024-07-14 02:06:08 +00:00

229 lines
7.3 KiB
JSON

{
"id": "CVE-2012-1627",
"sourceIdentifier": "secalert@redhat.com",
"published": "2012-09-20T00:55:04.843",
"lastModified": "2012-10-15T04:00:00.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in vud_term.module in the Vote Up/Down module 6.x-2.x before 6.x-2.8 and 6.x-3.x before 6.x-3.1 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via taxonomy terms."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en vud_term en el m\u00f3dulo Vote Up/Down v6.x-2.x anterior a v6.x-2.8 y v6.x-3.x anterior a v6.x-3.1 para Drupal, permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de t\u00e9rminos en las taxonom\u00edas."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B907789-ED9B-49DE-8C2F-29CAC5EBA1CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "82F35C91-F4A9-46FE-9CCF-142F19B5CD27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "68BEFB84-92B6-4C98-BA2A-C54F261337A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "AD13A4C8-202E-4AF6-8CB3-FE8F444DD274"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AB8E429C-9D6B-43A6-91A9-879FD5D4CC92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6E886F2B-26A2-46D8-84AF-997E91167094"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC1ADD4-DE7C-461C-AB59-A446989DBE07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0AE6ACFB-7DC9-48DB-802B-8AFB99533A3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0E9B9549-14F2-404D-9F75-8FF56D00DEC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "713FC890-282F-4BCC-9466-19F5025886C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "61DC774A-C3DF-4307-9111-8B45AE079362"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-2.x:dev:*:*:*:*:*:*",
"matchCriteriaId": "319D534E-1670-4384-83E4-3871510545CD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1C22BF4F-084B-4BDD-A8B7-8EE95DFC5A99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-3.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "8E0D3599-C980-4C51-8998-E7A4E05B1459"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-3.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "05B7485A-E39C-482E-A396-17371629EEFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvil07:vote_up_down:6.x-3.x:dev:*:*:*:*:*:*",
"matchCriteriaId": "838E6FB9-3A6A-449D-BD60-517E1A306159"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF"
}
]
}
]
}
],
"references": [
{
"url": "http://drupal.org/node/1400528",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://drupal.org/node/1400530",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://drupal.org/node/1401580",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://drupalcode.org/project/vote_up_down.git/commit/fe83aa4b8fa44d83a01494870a80d4651434f4c0",
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/47549",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2012/04/07/1",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/51376",
"source": "secalert@redhat.com"
}
]
}