Vulnerabilites related to reyero - i18n
cve-2010-1530
Vulnerability from cvelistv5
Published
2010-04-26 18:00
Modified
2024-09-17 03:38
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the Internationalization module 6.x before 6.x-1.4 for Drupal allow remote authenticated users, with translate interface or administer blocks privileges, to inject arbitrary web script or HTML via (1) strings used in block translation or (2) the untranslated input.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/63589 | vdb-entry, x_refsource_OSVDB | |
http://drupal.org/node/764906 | x_refsource_CONFIRM | |
http://drupal.org/node/764998 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/39304 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/39361 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T01:28:41.466Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "63589", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/63589", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://drupal.org/node/764906", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://drupal.org/node/764998", }, { name: "39304", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/39304", }, { name: "39361", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/39361", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in the Internationalization module 6.x before 6.x-1.4 for Drupal allow remote authenticated users, with translate interface or administer blocks privileges, to inject arbitrary web script or HTML via (1) strings used in block translation or (2) the untranslated input.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2010-04-26T18:00:00Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "63589", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/63589", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://drupal.org/node/764906", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://drupal.org/node/764998", }, { name: "39304", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/39304", }, { name: "39361", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/39361", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2010-1530", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site scripting (XSS) vulnerabilities in the Internationalization module 6.x before 6.x-1.4 for Drupal allow remote authenticated users, with translate interface or administer blocks privileges, to inject arbitrary web script or HTML via (1) strings used in block translation or (2) the untranslated input.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "63589", refsource: "OSVDB", url: "http://osvdb.org/63589", }, { name: "http://drupal.org/node/764906", refsource: "CONFIRM", url: "http://drupal.org/node/764906", }, { name: "http://drupal.org/node/764998", refsource: "CONFIRM", url: "http://drupal.org/node/764998", }, { name: "39304", refsource: "BID", url: "http://www.securityfocus.com/bid/39304", }, { name: "39361", refsource: "SECUNIA", url: "http://secunia.com/advisories/39361", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2010-1530", datePublished: "2010-04-26T18:00:00Z", dateReserved: "2010-04-26T00:00:00Z", dateUpdated: "2024-09-17T03:38:19.132Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2010-04-26 18:30
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the Internationalization module 6.x before 6.x-1.4 for Drupal allow remote authenticated users, with translate interface or administer blocks privileges, to inject arbitrary web script or HTML via (1) strings used in block translation or (2) the untranslated input.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.0:*:*:*:*:*:*:*", matchCriteriaId: "B626FE9F-03E2-48C3-B8F7-770135921752", vulnerable: true, }, { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.0:beta1:*:*:*:*:*:*", matchCriteriaId: "0D579F57-8DA2-4498-A0F0-9C371603D9CE", vulnerable: true, }, { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.0:beta2:*:*:*:*:*:*", matchCriteriaId: "014AEB89-9127-448F-A795-E121527F2FB0", vulnerable: true, }, { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.0:beta3:*:*:*:*:*:*", matchCriteriaId: "557E5DA6-6EF9-4AA2-8E9C-57647CF69FA3", vulnerable: true, }, { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.0:beta4:*:*:*:*:*:*", matchCriteriaId: "0F30BB02-C461-4C49-A414-692C1EB13A62", vulnerable: true, }, { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.0:beta6:*:*:*:*:*:*", matchCriteriaId: "1280FD26-7BA4-476F-9F4C-D4BB73521255", vulnerable: true, }, { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.0:dev:*:*:*:*:*:*", matchCriteriaId: "59A2A8A3-B29C-4883-B0DD-8DDA8DCD102F", vulnerable: true, }, { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.1:*:*:*:*:*:*:*", matchCriteriaId: "D10BF63D-BC75-46C4-84A9-7821EF9B506B", vulnerable: true, }, { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.2:*:*:*:*:*:*:*", matchCriteriaId: "73E5A3E4-6877-4B7A-BF13-65885A3BF171", vulnerable: true, }, { criteria: "cpe:2.3:a:reyero:i18n:6.x-1.3:*:*:*:*:*:*:*", matchCriteriaId: "C18D87FC-0AD5-4612-981E-65054A54F103", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", matchCriteriaId: "799CA80B-F3FA-4183-A791-2071A7DA1E54", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in the Internationalization module 6.x before 6.x-1.4 for Drupal allow remote authenticated users, with translate interface or administer blocks privileges, to inject arbitrary web script or HTML via (1) strings used in block translation or (2) the untranslated input.", }, { lang: "es", value: "Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en el módulo de internacionalización para Drupal v6.x antes de v6.x-1.4 permiten inyectar HTML o scripts web a usuarios remotos autenticados, con privilegios de interfaz de traducción o de administración de bloques, a través de (1) cadenas utilizadas en la traducción de bloques o (2) entradas sin traducir.", }, ], id: "CVE-2010-1530", lastModified: "2025-04-11T00:51:21.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2010-04-26T18:30:00.597", references: [ { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://drupal.org/node/764906", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://drupal.org/node/764998", }, { source: "cve@mitre.org", url: "http://osvdb.org/63589", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/39361", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/39304", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://drupal.org/node/764906", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://drupal.org/node/764998", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/63589", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/39361", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/39304", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }