- Description
- Cross-site scripting (XSS) vulnerability in the LoginToboggan module 4.7.x-1.0, 4.7.x-1.x-dev, and 5.x-1.x-dev before 20070712 for Drupal, when configured to display a "Log out" link, allows remote attackers to inject arbitrary web script or HTML via a crafted username. NOTE: Drupal sanitizes the username by removing certain characters, so this might not be a vulnerability on default installations.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drupal:logintoboggan_module:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "05EFF0E0-3361-46BF-860A-568E272B5C7C",
"versionEndIncluding": "4.7.x-1.0"
},
{
"criteria": "cpe:2.3:a:drupal:logintoboggan_module:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2F0C8D28-AEAD-4BA5-95C3-CA0C2C80600E",
"versionEndIncluding": "5.x-1.x-dev"
}
],
"operator": "OR"
}
]
}
]