CVE-2012-4469

Cross-site scripting (XSS) vulnerability in the Hashcash module 6.x-2.x before 6.x-2.6 and 7.x-2.x before 7.x-2.2 for Drupal, when "Log failed hashcash" is enabled, allows remote attackers to inject arbitrary web script or HTML via an invalid token, which is not properly handled when administrators use the Database logging module.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:simon_rycroft:hashcash:6.x-2.0:*:*:*:*:*:*:*
cpe:2.3:a:simon_rycroft:hashcash:6.x-2.1:*:*:*:*:*:*:*
cpe:2.3:a:simon_rycroft:hashcash:6.x-2.2:*:*:*:*:*:*:*
cpe:2.3:a:simon_rycroft:hashcash:6.x-2.3:*:*:*:*:*:*:*
cpe:2.3:a:simon_rycroft:hashcash:6.x-2.4:*:*:*:*:*:*:*
cpe:2.3:a:simon_rycroft:hashcash:6.x-2.5:*:*:*:*:*:*:*
cpe:2.3:a:simon_rycroft:hashcash:7.x-2.0:*:*:*:*:*:*:*
cpe:2.3:a:simon_rycroft:hashcash:7.x-2.1:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:42

Type Values Removed Values Added
References () http://drupal.org/node/1650784 - Patch () http://drupal.org/node/1650784 - Patch
References () http://drupal.org/node/1650790 - Patch () http://drupal.org/node/1650790 - Patch
References () http://drupal.org/node/1663306 - Patch, Vendor Advisory () http://drupal.org/node/1663306 - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2012/10/04/3 - () http://www.openwall.com/lists/oss-security/2012/10/04/3 -

Information

Published : 2012-11-30 22:55

Updated : 2024-11-21 01:42


NVD link : CVE-2012-4469

Mitre link : CVE-2012-4469

CVE.ORG link : CVE-2012-4469


JSON object : View

Products Affected

drupal

  • drupal

simon_rycroft

  • hashcash
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')