CVE-2012-2071
Published Aug 14, 2012
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the Contact Forms module 6.x-1.x before 6.x-1.13 for Drupal when the core contact form is enabled, allows remote authenticated users with the administer site-wide contact form permission to inject arbitrary web script or HTML via unspecified vectors.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A63A622-340A-4473-8642-764006D35953" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B9E98C9-D71D-4E74-8A59-9A2419E19EA5" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE72C975-94E2-47EE-A59E-9012EFF48EA7" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEE8FE09-51CF-4214-B623-F6E988960AD2" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7496BF5-ACFC-4842-B6D4-7B988B00BD8F" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21E5A5E8-764A-4A9E-B844-71C9C94261C1" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DE6148A-7A13-4857-A327-DBDDAC335F7E" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68E346AC-5BB2-48D6-9383-FA5229AF464C" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25E01081-298B-4B4A-941A-76B4536BE84E" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9B6482F-CF51-4D64-BA7D-018A2C6F6310" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7982EEB6-7CFE-4883-AE7A-437E9DF2374F" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E1DF6CD-CBC7-48BF-9306-F3497DC08ACF" }, { "criteria": "cpe:2.3:a:geoff_davies:contact_forms:6.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4122C575-34BF-4DFD-A49F-47053A060FCC" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ], "operator": "OR" } ], "operator": "AND" } ]