CVE-2012-2075
Published Aug 14, 2012
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the Contact Save module 6.x-1.x before 6.x-1.5 for Drupal allows remote authenticated users with the access site-wide contact form permission to inject arbitrary web script or HTML via unspecified vectors.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "441857E4-89F9-4BE1-9C23-DC5F105860DC" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "389542DE-6ADA-4A35-A925-95B551DF169D" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.1:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAB9C631-36A8-43D1-AFA0-D5BF5949175B" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A83004C0-F60D-450C-AFBF-1918DC47414D" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.2:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E720B1EA-EAAB-40CF-89C6-F501D6E12E7E" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.2:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCECF0E7-F7D0-4D2B-83BD-874909987A98" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.2:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAB3C82A-C031-47A1-BF1C-F8EC9A0F9541" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9188D10E-943A-49F1-ADBF-6CEE88FE0956" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.3:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6F8FBD9-6E22-47DF-9006-067BF914726B" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.3:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5281B5C4-2B0E-4A47-9EFC-8C681C688BD0" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.3:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E81A4282-8626-4B1C-9D25-34426F350143" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58B9A223-B7AD-4DCF-92B6-A495E026E845" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.4:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AADD0E13-B2E7-4FB8-8C4D-BC37EBDCFF2B" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.4:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1597E1A-267F-4CC2-8C3A-190FCEB4A464" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "207315ED-A212-4ED1-8D1D-373E67341546" }, { "criteria": "cpe:2.3:a:steindom:contact_save:6.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5275265-E1C6-46C5-949E-DAA74607AA9F" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ], "operator": "OR" } ], "operator": "AND" } ]