The Janrain Capture module 6.x-1.0 and 7.x-1.0 for Drupal, when creating a local user account, allows attackers to obtain part of the initial input used to generate passwords, which makes it easier to conduct brute force password guessing attacks.
References
Link | Resource |
---|---|
http://drupal.org/node/1632702 | Patch |
http://drupal.org/node/1632704 | Patch |
http://drupal.org/node/1632734 | Patch Vendor Advisory |
http://osvdb.org/82957 | |
http://drupal.org/node/1632702 | Patch |
http://drupal.org/node/1632704 | Patch |
http://drupal.org/node/1632734 | Patch Vendor Advisory |
http://osvdb.org/82957 |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://drupal.org/node/1632702 - Patch | |
References | () http://drupal.org/node/1632704 - Patch | |
References | () http://drupal.org/node/1632734 - Patch, Vendor Advisory | |
References | () http://osvdb.org/82957 - |
Information
Published : 2012-06-27 00:55
Updated : 2024-11-21 01:41
NVD link : CVE-2012-3798
Mitre link : CVE-2012-3798
CVE.ORG link : CVE-2012-3798
JSON object : View
Products Affected
bryce_hamrick
- janrain_capture
drupal
- drupal
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor