CVE-2012-5538
Published Dec 3, 2012
Last updated 12 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the FileField Sources module 6.x-1.x before 6.x-1.6 and 7.x-1.x before 7.x-1.6 for Drupal, when the field has "Reference existing" source enabled, allows remote authenticated users to inject arbitrary web script or HTML via the filename of an uploaded file.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A67B47CB-0BDD-4A44-A356-28FFE1FB3113" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9EDE6AE-FF05-41FC-853D-87E39AF83D75" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8118B201-35B5-45F5-9484-D7B14CA2E00A" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0AE743E-186F-4ACB-82DC-491DCFE1AA5D" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "958D06E8-5DE8-4B40-83FE-E1669C888B7A" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AC75C81-97AE-4201-AA3C-D7114AEFC3C1" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F253681F-56D8-4D34-BD74-3E9A6653972B" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.2:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C272DA32-518F-4401-97F2-53BD096D6799" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F3A8434-FCEA-4654-BD19-3C7E6626A70D" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1560CFC5-72AF-425C-A6F1-E56192C0327C" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A9973B0-C6D8-4DD7-8E7D-67E5AE82654E" }, { "criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CEB17CA-912B-468D-B659-1E9C9CE5675B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ], "operator": "OR" } ], "operator": "AND" } ]