CVE-2012-1641

The finder_import function in the Finder module 6.x-1.x before 6.x-1.26, 7.x-1.x, and 7.x-2.x before 7.x-2.0-alpha8 for Drupal allows remote authenticated users with the administer finder permission to execute arbitrary PHP code via admin/build/finder/import.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:danielb:finder:6.x-1.0:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha10:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha11:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha12:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha13:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha14:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha15:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha16:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha17:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha18:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha19:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha20:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha21:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha22:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha23:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha24:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha25:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha26:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha27:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha28:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha7:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha8:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha9:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:beta3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:rc4:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable0:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable4:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable5:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable6:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable7:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.1:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.2:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.3:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.4:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.5:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.6:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.7:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.8:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.9:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.10:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.11:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.12:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.13:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.14:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.15:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.16:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.17:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.18:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.19:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.20:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.21:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.23:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.24:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.x-dev:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.0:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.1:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.2:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.3:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.4:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.5:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.6:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.x:dev:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.x:dev:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:37

Type Values Removed Values Added
References () http://drupal.org/node/1432318 - Patch () http://drupal.org/node/1432318 - Patch
References () http://drupal.org/node/1432320 - Patch () http://drupal.org/node/1432320 - Patch
References () http://drupalcode.org/project/finder.git/commit/bc0cc82 - () http://drupalcode.org/project/finder.git/commit/bc0cc82 -
References () http://secunia.com/advisories/47915 - Vendor Advisory () http://secunia.com/advisories/47915 - Vendor Advisory
References () http://secunia.com/advisories/47943 - Vendor Advisory () http://secunia.com/advisories/47943 - Vendor Advisory
References () http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities - Exploit () http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities - Exploit
References () http://www.openwall.com/lists/oss-security/2012/03/16/9 - () http://www.openwall.com/lists/oss-security/2012/03/16/9 -
References () http://www.openwall.com/lists/oss-security/2012/03/19/9 - () http://www.openwall.com/lists/oss-security/2012/03/19/9 -
References () http://www.openwall.com/lists/oss-security/2012/04/07/1 - () http://www.openwall.com/lists/oss-security/2012/04/07/1 -
References () http://www.osvdb.org/79014 - () http://www.osvdb.org/79014 -
References () https://drupal.org/node/1432970 - Vendor Advisory () https://drupal.org/node/1432970 - Vendor Advisory

Information

Published : 2012-08-28 17:55

Updated : 2024-11-21 01:37


NVD link : CVE-2012-1641

Mitre link : CVE-2012-1641

CVE.ORG link : CVE-2012-1641


JSON object : View

Products Affected

danielb

  • finder

drupal

  • drupal
CWE
CWE-264

Permissions, Privileges, and Access Controls