CVE-2010-1958
Published Jun 21, 2010
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the FileField module 5.x before 5.x-2.5 and 6.x before 6.x-3.4 for Drupal allows remote authenticated users, with create or edit permissions and 'Path to File' or 'URL to File' display enabled, to inject arbitrary web script or HTML via the file name (filepath parameter).
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-1.x-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "104D78D6-34CA-4779-9D41-807C2C89BD76" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21DF5C36-F84A-4008-869F-01FB6EF9913A" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0713728F-D5A1-4898-9042-8C2466966404" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86788078-AB86-431B-A36D-90A37FBDA083" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FC1CF20-8024-4DD7-A57F-F547E1BAFE82" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.3:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAB8E63D-9D9C-4681-8860-DE3829BC125E" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.3:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6E851FC-5241-48D2-A89D-960296DBE107" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.3:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75BF107F-4C49-4254-AD3D-BB5F327EB86C" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B7E07E3-9EB2-4E8F-8DCC-FF1A21648352" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.x-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0121B09D-8A5B-41A7-AF88-1C5E9DF2F8C3" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1E4D3FE-6B93-4888-9596-6419DEB7414D" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61B24B1E-980D-4272-AE2B-AF09D6C948D8" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF208318-2CB9-417F-9D92-C7D3D6688C1F" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3BE7A55-F2C4-441F-B40D-9253D13EC3C3" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C636D59-DF41-4824-A369-C9C07A096EE0" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B30E691-8BCE-412E-9E3E-037C15F0B585" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83FC3D58-5EDF-4F85-9652-9BF8826D1DC7" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B98C715F-CE0D-4AF9-9515-7220A10FA10C" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D8D9756-B97C-4A62-9739-67418E0EE537" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D11BE48A-3D97-4139-919B-4B43760744DF" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C371F3D3-3D4F-44CB-AD1C-802CF378E034" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DDD9453-D6EB-4D09-8781-B3C9F9ECE31F" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B727EAD-8690-446B-B931-72B43D6A8C09" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AE5855D-9B2E-4822-B022-98E4600D281D" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44C72DDE-97F1-4B58-AF7D-AFBE46615839" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FAE4259-7476-402E-8FEE-BD41CF895629" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F769591-CD7F-4931-9E38-A6606384E954" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7E863E5-D466-4A81-8870-795B9991F9F6" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "989E928E-AB25-4B0E-B23E-28825343EA59" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D594C4E-435D-4083-9FF3-A3533519BC77" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64F51F45-06D5-42A8-B0AC-ED403E218F3D" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3BF74CD-6272-4586-A2CB-2B5DDB6E6D27" }, { "criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.x-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F887AE9-1116-4460-AE88-54E92CCA49C7" } ], "operator": "OR" } ], "operator": "AND" } ]