CVE-2012-5552
Published Dec 3, 2012
Last updated 11 years ago
Overview
- Description
- The Password policy module 6.x-1.x before 6.x-1.5 and 7.x-1.x before 7.x-1.3 for Drupal allows remote attackers to obtain password hashes by sniffing the network, related to "client-side password history checks."
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-200
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F1200EF-2B1D-4925-A7DD-04A7C3B2460C" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AE36BB3-3A54-490D-9F97-A4BC4AFC5E19" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C88332BF-27B7-485C-AA8D-4995063C06D5" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DE04B82-50AA-453A-8FBD-83ECBBDA1029" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.0:alpha4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3BA6E1C-D998-4FBE-BD43-124B6A6B2D1D" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD6EC7C3-5EB7-4A3E-845C-3A47157ADBFA" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE6081CD-4C7E-4240-8F9D-ECEF19B94136" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DCF22DD-41DF-4A56-90A8-4ECF2380A793" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "518FE01B-D36D-43B9-849B-C99D3404F467" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A5997AA-65BB-4DDD-A4BD-1A34C5EFCDD2" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:6.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C55F48A-ED8B-4195-ACB4-DDF376C05527" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B4FA2AD-ABE3-46C4-96E1-C59FAA3AB92A" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92235A40-A86D-4C3B-9DBF-1569A96E8F25" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D485B3C-9EA9-4F0C-9CDF-46B2C2AB789C" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E15947A-4DA7-4099-B5FF-C4A9456607DB" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10BFF1BA-9210-426E-A886-B9D3FD900B38" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F77630AB-6EAB-41E0-861D-12070C6AD4B0" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00C3979A-46CD-4DB8-A8A4-E099DC8BB7D9" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1BE9C23-E11C-4359-B4DA-36EB2BC82A09" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "626ACD90-5424-48D4-AAB3-B346D86A127E" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1E043F2-1598-42AF-BD46-75249D77CC83" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A8057E0-A8F2-4AD5-B23F-D49EBD284CEE" }, { "criteria": "cpe:2.3:a:erikwebb:password_policy:7.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BEFCE92E-106D-4E23-8A08-08E68CB0CB43" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ], "operator": "OR" } ], "operator": "AND" } ]