The Ubercart AJAX Cart 6.x-2.x before 6.x-2.1 for Drupal stores the PHP session id in the JavaScript settings array in page loads, which might allow remote attackers to obtain sensitive information by sniffing or reading the cache of the HTML of a webpage.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://drupal.org/node/1619586 - Patch | |
References | () http://drupal.org/node/1633048 - Patch, Vendor Advisory | |
References | () http://drupalcode.org/project/uc_ajax_cart.git/commitdiff/b59cdd5 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2012/06/14/3 - | |
References | () http://www.securityfocus.com/bid/53999 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/76332 - |
Information
Published : 2012-06-27 00:55
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2731
Mitre link : CVE-2012-2731
CVE.ORG link : CVE-2012-2731
JSON object : View
Products Affected
richardo_ante
- ubercart_ajax_cart
drupal
- drupal
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor