CVE-2012-6645

Cross-site scripting (XSS) vulnerability in the autocomplete functionality in the Finder module 6.x-1.x before 6.x-1.26, 7.x-1.x, and 7.x-2.x before 7.x-2.0-alpha8 for Drupal allows remote attackers to inject arbitrary web script or HTML via the title of a node, a different vulnerability than CVE-2012-1561.
References
Link Resource
http://drupal.org/node/1432318
http://drupal.org/node/1432320 Patch Vendor Advisory
http://drupalcode.org/project/finder.git/commit/13e2d0c
http://drupalcode.org/project/finder.git/commit/58443aa
http://drupalcode.org/project/finder.git/commit/758fcf9
http://drupalcode.org/project/finder.git/commit/bc0cc82
http://secunia.com/advisories/47941
http://secunia.com/advisories/47943 Vendor Advisory
http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities Exploit
http://www.openwall.com/lists/oss-security/2012/03/16/9
http://www.openwall.com/lists/oss-security/2012/03/19/9
http://www.openwall.com/lists/oss-security/2012/04/07/1
http://www.osvdb.org/79015
https://drupal.org/node/1432970
https://exchange.xforce.ibmcloud.com/vulnerabilities/73110
http://drupal.org/node/1432318
http://drupal.org/node/1432320 Patch Vendor Advisory
http://drupalcode.org/project/finder.git/commit/13e2d0c
http://drupalcode.org/project/finder.git/commit/58443aa
http://drupalcode.org/project/finder.git/commit/758fcf9
http://drupalcode.org/project/finder.git/commit/bc0cc82
http://secunia.com/advisories/47941
http://secunia.com/advisories/47943 Vendor Advisory
http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities Exploit
http://www.openwall.com/lists/oss-security/2012/03/16/9
http://www.openwall.com/lists/oss-security/2012/03/19/9
http://www.openwall.com/lists/oss-security/2012/04/07/1
http://www.osvdb.org/79015
https://drupal.org/node/1432970
https://exchange.xforce.ibmcloud.com/vulnerabilities/73110
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:danielb:finder:6.x-1.0:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha10:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha11:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha12:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha13:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha14:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha15:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha16:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha17:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha18:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha19:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha20:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha21:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha22:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha23:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha24:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha25:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha26:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha27:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha28:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha7:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha8:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:alpha9:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:beta3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:rc4:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable0:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable4:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable5:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable6:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.0:unstable7:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.1:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.2:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.3:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.4:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.5:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.6:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.7:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.8:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.9:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.10:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.11:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.12:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.13:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.14:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.15:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.16:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.17:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.18:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.19:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.20:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.21:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.23:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.24:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.25:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:6.x-1.x-dev:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.0:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.1:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.2:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.3:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.4:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.5:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.6:*:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-1.x:dev:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:danielb:finder:7.x-2.x:dev:*:*:*:*:*:*

History

21 Nov 2024, 01:46

Type Values Removed Values Added
References () http://drupal.org/node/1432318 - () http://drupal.org/node/1432318 -
References () http://drupal.org/node/1432320 - Patch, Vendor Advisory () http://drupal.org/node/1432320 - Patch, Vendor Advisory
References () http://drupalcode.org/project/finder.git/commit/13e2d0c - () http://drupalcode.org/project/finder.git/commit/13e2d0c -
References () http://drupalcode.org/project/finder.git/commit/58443aa - () http://drupalcode.org/project/finder.git/commit/58443aa -
References () http://drupalcode.org/project/finder.git/commit/758fcf9 - () http://drupalcode.org/project/finder.git/commit/758fcf9 -
References () http://drupalcode.org/project/finder.git/commit/bc0cc82 - () http://drupalcode.org/project/finder.git/commit/bc0cc82 -
References () http://secunia.com/advisories/47941 - () http://secunia.com/advisories/47941 -
References () http://secunia.com/advisories/47943 - Vendor Advisory () http://secunia.com/advisories/47943 - Vendor Advisory
References () http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities - Exploit () http://www.madirish.net/content/drupal-finder-6x-19-xss-and-remote-code-execution-vulnerabilities - Exploit
References () http://www.openwall.com/lists/oss-security/2012/03/16/9 - () http://www.openwall.com/lists/oss-security/2012/03/16/9 -
References () http://www.openwall.com/lists/oss-security/2012/03/19/9 - () http://www.openwall.com/lists/oss-security/2012/03/19/9 -
References () http://www.openwall.com/lists/oss-security/2012/04/07/1 - () http://www.openwall.com/lists/oss-security/2012/04/07/1 -
References () http://www.osvdb.org/79015 - () http://www.osvdb.org/79015 -
References () https://drupal.org/node/1432970 - () https://drupal.org/node/1432970 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/73110 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/73110 -

Information

Published : 2014-04-08 14:22

Updated : 2024-11-21 01:46


NVD link : CVE-2012-6645

Mitre link : CVE-2012-6645

CVE.ORG link : CVE-2012-6645


JSON object : View

Products Affected

danielb

  • finder
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')