CVE-2013-0225
Published Mar 19, 2013
Last updated 12 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the User Relationships module 6.x-1.x before 6.x-1.4 and 7.x-1.x before 7.x-1.0-alpha5 for Drupal allows remote authenticated users with the "administer user relationships" permission to inject arbitrary web script or HTML via a relationship name.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55BFEC5F-8A2A-4CE2-B0FE-A41710221CD1" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BF3CBB4-F32B-4F46-A693-C5073AF34E7A" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E1A567C-DF8B-4D1F-BE8A-DC014DF29D7D" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6341D36-1B7B-441E-B3FF-BD9FDE079609" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98AF243C-D620-4D5C-97FB-0BB43A32A639" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "795014AA-FF52-417A-B9ED-571986837394" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9AD23F12-1D3F-4753-B0E4-2BD34FAABA62" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "684B1FE5-A32E-43F4-8338-604D789DEEFD" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE491ABB-A7DF-461C-B426-8C9FC65CBD0D" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "343AA1CB-8F0B-484A-87AD-2F782F2ADAB9" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:beta9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13ED6D3C-5642-4017-B2BC-6794BCAE558C" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E6189F6-5276-4C79-96A9-8332FDFB548F" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11F4CFD2-BF07-407A-ADFD-1E5AB734A8D7" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A837E2EA-0F3F-4145-8E03-6EC970751C4D" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF6E2728-A445-4D30-86C8-776B20D5EC70" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB303A26-CA9A-4B79-9B49-1BD7B7FB81B2" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.0:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D40F9329-1D10-4E92-8070-3A8091D5B389" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFA49D90-2B3F-404C-8F75-C21DD29F8371" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01A7730F-0265-493D-8853-5AEAA31499C1" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB4EE897-5681-4CB4-9691-623645859117" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:6.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33FEFBC3-65D0-4948-8617-59897DCA1557" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:7.x-1.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3774335-3EAD-438A-AFD3-95E5F4FD81AF" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:7.x-1.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "440F5DBA-E67D-45A3-BFED-8E2452F615E7" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:7.x-1.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "209B0F1B-8BC7-4EF2-9469-34214B6179EF" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:7.x-1.0:alpha4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7291EA58-A504-47FA-90CE-AB5B4D75BD61" }, { "criteria": "cpe:2.3:a:user_relationships_project:user_relationships:7.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71A819D3-1712-4B34-9F6B-EFF3236F1E4A" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF" } ], "operator": "OR" } ], "operator": "AND" } ]