Cross-site scripting (XSS) vulnerability in the Hashcash module 6.x-2.x before 6.x-2.6 and 7.x-2.x before 7.x-2.2 for Drupal, when "Log failed hashcash" is enabled, allows remote attackers to inject arbitrary web script or HTML via an invalid token, which is not properly handled when administrators use the Database logging module.
References
Link | Resource |
---|---|
http://drupal.org/node/1650784 | Patch |
http://drupal.org/node/1650790 | Patch |
http://drupal.org/node/1663306 | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2012/10/04/3 | |
http://drupal.org/node/1650784 | Patch |
http://drupal.org/node/1650790 | Patch |
http://drupal.org/node/1663306 | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2012/10/04/3 |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://drupal.org/node/1650784 - Patch | |
References | () http://drupal.org/node/1650790 - Patch | |
References | () http://drupal.org/node/1663306 - Patch, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2012/10/04/3 - |
Information
Published : 2012-11-30 22:55
Updated : 2024-11-21 01:42
NVD link : CVE-2012-4469
Mitre link : CVE-2012-4469
CVE.ORG link : CVE-2012-4469
JSON object : View
Products Affected
drupal
- drupal
simon_rycroft
- hashcash
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')