Search criteria
15 vulnerabilities found for openid by peter_wolanin
FKIE_CVE-2010-3686
Vulnerability from fkie_nvd - Published: 2010-09-29 17:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not ensuring that fields are signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.1 | |
| drupal | drupal | 6.2 | |
| drupal | drupal | 6.3 | |
| drupal | drupal | 6.4 | |
| drupal | drupal | 6.5 | |
| drupal | drupal | 6.6 | |
| drupal | drupal | 6.7 | |
| drupal | drupal | 6.8 | |
| drupal | drupal | 6.9 | |
| drupal | drupal | 6.10 | |
| drupal | drupal | 6.11 | |
| drupal | drupal | 6.12 | |
| drupal | drupal | 6.13 | |
| drupal | drupal | 6.14 | |
| drupal | drupal | 6.15 | |
| drupal | drupal | 6.16 | |
| drupal | drupal | 6.17 | |
| peter_wolanin | openid | 5.x-1.0 | |
| peter_wolanin | openid | 5.x-1.1 | |
| peter_wolanin | openid | 5.x-1.2 | |
| peter_wolanin | openid | 5.x-1.3 | |
| peter_wolanin | openid | 5.x-1.x |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FFE07AAD-9207-4C5F-A108-7F7753E4F48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "D4149703-F7BB-4513-9379-992C089532D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "FCBC7BB8-2B50-476D-BD96-C968F105CE10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "550778E2-BEE5-403D-8744-0B18C5D3AFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "31B9F954-3A10-4378-A842-4061E97056DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "5BD3F6D1-2530-4B4C-86BE-DFDB886BF6E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FDF535DF-2338-4BF8-A9AC-3B6C60C4D591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "58876D53-BCE4-459E-AC75-37E4E46621CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "937F4629-2AA1-4954-BF72-8E9CAF1B67FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6410BD0A-1B47-4EC2-8D2A-161ADBB09699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52D8F291-CBEB-4EAA-9388-F63066A2DFA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0BD5AEC-F20E-4E53-AF3F-2C60BA2D2171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D76BC5-0409-4D78-8064-A78B923E9167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BB73B2E1-2554-4CA2-9C82-B694509CE43A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3A7827ED-D8AF-42B3-B514-39A04EB0879A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F491DE31-8DBB-4F4E-8798-F82DC855D08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADEA9E5-10EB-4AB4-BD90-1F64A15708AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "64D0A167-BE47-4E4E-8467-0AD2F38A3431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7CBB558-D5A3-4D68-9C62-D1D521BCFEF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D25FA1-2F31-40DB-AD54-DB233E060B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7F91E944-26C4-4886-B9B9-F32BD15569BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F7DF00E9-3952-4D1C-8ED5-3270BD9697F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0B779FA7-E371-4111-95B7-301C804DC0CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B89B2E01-DFC7-4672-85E7-3930EE653806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "39169C30-5F4D-4333-B0B9-0881811F1E01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A9703D3D-C2D3-4EA0-A67E-CC17B0146B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEDA1EF-D7DB-47B5-BF6C-A9ED84427030",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "421290CB-E860-4F32-AE8A-644DC73A423A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "659265E0-9FB3-4899-B9CE-54C57F65A30F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7E89F5-8445-4A86-9689-D21201DE8481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4AAE6553-046E-4A06-B513-120194C29DCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.x:dev:*:*:*:*:*:*",
"matchCriteriaId": "0E179022-F11E-4928-BA30-635732BE62E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not ensuring that fields are signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
},
{
"lang": "es",
"value": "El m\u00f3dulo de OpenID en Drupal v6.x antes de v6.18, y el m\u00f3dulo de OpenID v5.x antes de v5.x-1.4 para Drupal, viola el protocolo OpenID v2.0, al no garantizar que los campos est\u00e1n firmados, lo cual permite a atacantes remotos evitar la autenticaci\u00f3n mediante el aprovechamiento de una afirmaci\u00f3n de un proveedor de OpenID."
}
],
"id": "CVE-2010-3686",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-09-29T17:00:05.837",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880476"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880480"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/42388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880476"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/42388"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-3685
Vulnerability from fkie_nvd - Published: 2010-09-29 17:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.1 | |
| drupal | drupal | 6.2 | |
| drupal | drupal | 6.3 | |
| drupal | drupal | 6.4 | |
| drupal | drupal | 6.5 | |
| drupal | drupal | 6.6 | |
| drupal | drupal | 6.7 | |
| drupal | drupal | 6.8 | |
| drupal | drupal | 6.9 | |
| drupal | drupal | 6.10 | |
| drupal | drupal | 6.11 | |
| drupal | drupal | 6.12 | |
| drupal | drupal | 6.13 | |
| drupal | drupal | 6.14 | |
| drupal | drupal | 6.15 | |
| drupal | drupal | 6.16 | |
| drupal | drupal | 6.17 | |
| peter_wolanin | openid | 5.x-1.0 | |
| peter_wolanin | openid | 5.x-1.1 | |
| peter_wolanin | openid | 5.x-1.2 | |
| peter_wolanin | openid | 5.x-1.3 | |
| peter_wolanin | openid | 5.x-1.x |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FFE07AAD-9207-4C5F-A108-7F7753E4F48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "D4149703-F7BB-4513-9379-992C089532D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "FCBC7BB8-2B50-476D-BD96-C968F105CE10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "550778E2-BEE5-403D-8744-0B18C5D3AFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "31B9F954-3A10-4378-A842-4061E97056DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "5BD3F6D1-2530-4B4C-86BE-DFDB886BF6E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FDF535DF-2338-4BF8-A9AC-3B6C60C4D591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "58876D53-BCE4-459E-AC75-37E4E46621CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "937F4629-2AA1-4954-BF72-8E9CAF1B67FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6410BD0A-1B47-4EC2-8D2A-161ADBB09699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52D8F291-CBEB-4EAA-9388-F63066A2DFA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0BD5AEC-F20E-4E53-AF3F-2C60BA2D2171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D76BC5-0409-4D78-8064-A78B923E9167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BB73B2E1-2554-4CA2-9C82-B694509CE43A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3A7827ED-D8AF-42B3-B514-39A04EB0879A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F491DE31-8DBB-4F4E-8798-F82DC855D08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADEA9E5-10EB-4AB4-BD90-1F64A15708AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "64D0A167-BE47-4E4E-8467-0AD2F38A3431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7CBB558-D5A3-4D68-9C62-D1D521BCFEF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D25FA1-2F31-40DB-AD54-DB233E060B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7F91E944-26C4-4886-B9B9-F32BD15569BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F7DF00E9-3952-4D1C-8ED5-3270BD9697F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0B779FA7-E371-4111-95B7-301C804DC0CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B89B2E01-DFC7-4672-85E7-3930EE653806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "39169C30-5F4D-4333-B0B9-0881811F1E01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A9703D3D-C2D3-4EA0-A67E-CC17B0146B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEDA1EF-D7DB-47B5-BF6C-A9ED84427030",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "421290CB-E860-4F32-AE8A-644DC73A423A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "659265E0-9FB3-4899-B9CE-54C57F65A30F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7E89F5-8445-4A86-9689-D21201DE8481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4AAE6553-046E-4A06-B513-120194C29DCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.x:dev:*:*:*:*:*:*",
"matchCriteriaId": "0E179022-F11E-4928-BA30-635732BE62E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
},
{
"lang": "es",
"value": "El m\u00f3dulo de OpenID en Drupal v6.x antes de v6.18, y el m\u00f3dulo de OpenID v5.x antes de v5.x-1.4 para Drupal, viola el protocolo OpenID v2.0, al no comprobar la reutilizaci\u00f3n de los valores openid.response_nonce, lo cual permite a atacantes remotos evitar la autenticaci\u00f3n mediante el aprovechamiento de una afirmaci\u00f3n de un proveedor de OpenID."
}
],
"id": "CVE-2010-3685",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-09-29T17:00:05.790",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880476"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880480"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/42388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880476"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/42388"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-3091
Vulnerability from fkie_nvd - Published: 2010-09-29 17:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not verifying the openid.return_to value, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.0 | |
| drupal | drupal | 6.1 | |
| drupal | drupal | 6.2 | |
| drupal | drupal | 6.3 | |
| drupal | drupal | 6.4 | |
| drupal | drupal | 6.5 | |
| drupal | drupal | 6.6 | |
| drupal | drupal | 6.7 | |
| drupal | drupal | 6.8 | |
| drupal | drupal | 6.9 | |
| drupal | drupal | 6.10 | |
| drupal | drupal | 6.11 | |
| drupal | drupal | 6.12 | |
| drupal | drupal | 6.13 | |
| drupal | drupal | 6.14 | |
| drupal | drupal | 6.15 | |
| drupal | drupal | 6.16 | |
| drupal | drupal | 6.17 | |
| peter_wolanin | openid | 5.x-1.0 | |
| peter_wolanin | openid | 5.x-1.1 | |
| peter_wolanin | openid | 5.x-1.2 | |
| peter_wolanin | openid | 5.x-1.3 | |
| peter_wolanin | openid | 5.x-1.x |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FFE07AAD-9207-4C5F-A108-7F7753E4F48C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "D4149703-F7BB-4513-9379-992C089532D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "FCBC7BB8-2B50-476D-BD96-C968F105CE10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "550778E2-BEE5-403D-8744-0B18C5D3AFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "31B9F954-3A10-4378-A842-4061E97056DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "5BD3F6D1-2530-4B4C-86BE-DFDB886BF6E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FDF535DF-2338-4BF8-A9AC-3B6C60C4D591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "58876D53-BCE4-459E-AC75-37E4E46621CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "937F4629-2AA1-4954-BF72-8E9CAF1B67FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6410BD0A-1B47-4EC2-8D2A-161ADBB09699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "52D8F291-CBEB-4EAA-9388-F63066A2DFA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0BD5AEC-F20E-4E53-AF3F-2C60BA2D2171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D76BC5-0409-4D78-8064-A78B923E9167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BB73B2E1-2554-4CA2-9C82-B694509CE43A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3A7827ED-D8AF-42B3-B514-39A04EB0879A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F491DE31-8DBB-4F4E-8798-F82DC855D08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADEA9E5-10EB-4AB4-BD90-1F64A15708AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "64D0A167-BE47-4E4E-8467-0AD2F38A3431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7CBB558-D5A3-4D68-9C62-D1D521BCFEF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D25FA1-2F31-40DB-AD54-DB233E060B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7F91E944-26C4-4886-B9B9-F32BD15569BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F7DF00E9-3952-4D1C-8ED5-3270BD9697F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0B779FA7-E371-4111-95B7-301C804DC0CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B89B2E01-DFC7-4672-85E7-3930EE653806",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "39169C30-5F4D-4333-B0B9-0881811F1E01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A9703D3D-C2D3-4EA0-A67E-CC17B0146B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "2EEDA1EF-D7DB-47B5-BF6C-A9ED84427030",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "421290CB-E860-4F32-AE8A-644DC73A423A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "659265E0-9FB3-4899-B9CE-54C57F65A30F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7E89F5-8445-4A86-9689-D21201DE8481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4AAE6553-046E-4A06-B513-120194C29DCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.x:dev:*:*:*:*:*:*",
"matchCriteriaId": "0E179022-F11E-4928-BA30-635732BE62E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not verifying the openid.return_to value, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
},
{
"lang": "es",
"value": "El m\u00f3dulo OpenID en Drupal v6.x anterior a v6.18, y el m\u00f3dulo OpenID v5.x anterior a v5.x-1.4 para Drupal, viola el protocolo OpenID v2.0, al no verificar el valor openid.return_to, lo cual permite a atacantes remotos evitar la autenticaci\u00f3n mediante el aprovechamiento de una afirmaci\u00f3n de un proveedor de OpenID."
}
],
"id": "CVE-2010-3091",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-09-29T17:00:04.650",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880476"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880480"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/42388"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880476"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/880480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/42388"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-6836
Vulnerability from fkie_nvd - Published: 2009-06-27 18:47 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in OpenID 5.x before 5x.-1.2, a module for Drupal, allows remote attackers to hijack the authentication of unspecified victims to delete OpenID identities via unknown vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| drupal | drupal | * | |
| peter_wolanin | openid | 5.x-1.0 | |
| peter_wolanin | openid | 5.x-1.1 | |
| peter_wolanin | openid | 5.x-1.x |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "421290CB-E860-4F32-AE8A-644DC73A423A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "659265E0-9FB3-4899-B9CE-54C57F65A30F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.x:dev:*:*:*:*:*:*",
"matchCriteriaId": "0E179022-F11E-4928-BA30-635732BE62E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in OpenID 5.x before 5x.-1.2, a module for Drupal, allows remote attackers to hijack the authentication of unspecified victims to delete OpenID identities via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en OpenID 5.x antes de 5x.-1.2, un modulo para Drupal, permite a atacantes remotos secuestrar la autenticaci\u00f3n de victimas no especificadas para borrar identidades OpenID mediante vectores no especificados."
}
],
"id": "CVE-2008-6836",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-06-27T18:47:49.343",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/280592"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://drupal.org/node/280593"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/46939"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31027"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/30165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/280592"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://drupal.org/node/280593"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/46939"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31027"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/30165"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-6835
Vulnerability from fkie_nvd - Published: 2009-06-27 18:47 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in OpenID 5.x before 5.x-1.2, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| drupal | drupal | * | |
| peter_wolanin | openid | 5.x-1.0 | |
| peter_wolanin | openid | 5.x-1.1 | |
| peter_wolanin | openid | 5.x-1.x |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "421290CB-E860-4F32-AE8A-644DC73A423A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "659265E0-9FB3-4899-B9CE-54C57F65A30F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peter_wolanin:openid:5.x-1.x:dev:*:*:*:*:*:*",
"matchCriteriaId": "0E179022-F11E-4928-BA30-635732BE62E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in OpenID 5.x before 5.x-1.2, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en OpenID 5.x antes de 5.x-1.2, un modulo para Drupal, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante vectores no especificados."
}
],
"id": "CVE-2008-6835",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-06-27T18:47:45.610",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/280592"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/280593"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/46938"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31027"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/30165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/280592"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://drupal.org/node/280593"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/46938"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31027"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/30165"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2010-3686 (GCVE-0-2010-3686)
Vulnerability from cvelistv5 – Published: 2010-09-29 16:00 – Updated: 2024-09-16 20:41
VLAI?
Summary
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not ensuring that fields are signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:18:53.053Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not ensuring that fields are signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-29T16:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3686",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not ensuring that fields are signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://drupal.org/node/880480",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42388"
},
{
"name": "http://drupal.org/node/880476",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-3686",
"datePublished": "2010-09-29T16:00:00Z",
"dateReserved": "2010-09-29T00:00:00Z",
"dateUpdated": "2024-09-16T20:41:42.799Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3685 (GCVE-0-2010-3685)
Vulnerability from cvelistv5 – Published: 2010-09-29 16:00 – Updated: 2024-09-16 23:40
VLAI?
Summary
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:18:52.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-29T16:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3685",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://drupal.org/node/880480",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42388"
},
{
"name": "http://drupal.org/node/880476",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-3685",
"datePublished": "2010-09-29T16:00:00Z",
"dateReserved": "2010-09-29T00:00:00Z",
"dateUpdated": "2024-09-16T23:40:40.981Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3091 (GCVE-0-2010-3091)
Vulnerability from cvelistv5 – Published: 2010-09-29 16:00 – Updated: 2024-09-17 01:26
VLAI?
Summary
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not verifying the openid.return_to value, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:55:46.746Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not verifying the openid.return_to value, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-29T16:00:00Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3091",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not verifying the openid.return_to value, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://drupal.org/node/880480",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42388"
},
{
"name": "http://drupal.org/node/880476",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-3091",
"datePublished": "2010-09-29T16:00:00Z",
"dateReserved": "2010-08-20T00:00:00Z",
"dateUpdated": "2024-09-17T01:26:50.830Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-6835 (GCVE-0-2008-6835)
Vulnerability from cvelistv5 – Published: 2009-06-27 18:00 – Updated: 2024-09-16 17:15
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in OpenID 5.x before 5.x-1.2, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:42:00.899Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "30165",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46938",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/46938"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/280592"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in OpenID 5.x before 5.x-1.2, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-06-27T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "30165",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46938",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/46938"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/280592"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31027"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6835",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in OpenID 5.x before 5.x-1.2, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "30165",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46938",
"refsource": "OSVDB",
"url": "http://osvdb.org/46938"
},
{
"name": "http://drupal.org/node/280592",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280592"
},
{
"name": "http://drupal.org/node/280593",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31027"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6835",
"datePublished": "2009-06-27T18:00:00Z",
"dateReserved": "2009-06-27T00:00:00Z",
"dateUpdated": "2024-09-16T17:15:08.648Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-6836 (GCVE-0-2008-6836)
Vulnerability from cvelistv5 – Published: 2009-06-27 18:00 – Updated: 2024-09-16 23:51
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in OpenID 5.x before 5x.-1.2, a module for Drupal, allows remote attackers to hijack the authentication of unspecified victims to delete OpenID identities via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:42:00.864Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "30165",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46939",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/46939"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/280592"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in OpenID 5.x before 5x.-1.2, a module for Drupal, allows remote attackers to hijack the authentication of unspecified victims to delete OpenID identities via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-06-27T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "30165",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46939",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/46939"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/280592"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31027"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6836",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF) vulnerability in OpenID 5.x before 5x.-1.2, a module for Drupal, allows remote attackers to hijack the authentication of unspecified victims to delete OpenID identities via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "30165",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46939",
"refsource": "OSVDB",
"url": "http://osvdb.org/46939"
},
{
"name": "http://drupal.org/node/280592",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280592"
},
{
"name": "http://drupal.org/node/280593",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31027"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6836",
"datePublished": "2009-06-27T18:00:00Z",
"dateReserved": "2009-06-27T00:00:00Z",
"dateUpdated": "2024-09-16T23:51:04.950Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3686 (GCVE-0-2010-3686)
Vulnerability from nvd – Published: 2010-09-29 16:00 – Updated: 2024-09-16 20:41
VLAI?
Summary
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not ensuring that fields are signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:18:53.053Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not ensuring that fields are signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-29T16:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3686",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not ensuring that fields are signed, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://drupal.org/node/880480",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42388"
},
{
"name": "http://drupal.org/node/880476",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-3686",
"datePublished": "2010-09-29T16:00:00Z",
"dateReserved": "2010-09-29T00:00:00Z",
"dateUpdated": "2024-09-16T20:41:42.799Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3685 (GCVE-0-2010-3685)
Vulnerability from nvd – Published: 2010-09-29 16:00 – Updated: 2024-09-16 23:40
VLAI?
Summary
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:18:52.935Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-29T16:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3685",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not checking for reuse of openid.response_nonce values, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://drupal.org/node/880480",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42388"
},
{
"name": "http://drupal.org/node/880476",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-3685",
"datePublished": "2010-09-29T16:00:00Z",
"dateReserved": "2010-09-29T00:00:00Z",
"dateUpdated": "2024-09-16T23:40:40.981Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3091 (GCVE-0-2010-3091)
Vulnerability from nvd – Published: 2010-09-29 16:00 – Updated: 2024-09-17 01:26
VLAI?
Summary
The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not verifying the openid.return_to value, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:55:46.746Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not verifying the openid.return_to value, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2010-09-29T16:00:00Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/42388"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2010-3091",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OpenID module in Drupal 6.x before 6.18, and the OpenID module 5.x before 5.x-1.4 for Drupal, violates the OpenID 2.0 protocol by not verifying the openid.return_to value, which allows remote attackers to bypass authentication by leveraging an assertion from an OpenID provider."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://drupal.org/node/880480",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880480"
},
{
"name": "DSA-2113",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2113"
},
{
"name": "[oss-security] 20100913 Re: CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128440896914512\u0026w=2"
},
{
"name": "42388",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/42388"
},
{
"name": "http://drupal.org/node/880476",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/880476"
},
{
"name": "[oss-security] 20100911 CVE id requests: drupal",
"refsource": "MLIST",
"url": "http://marc.info/?l=oss-security\u0026m=128418560705305\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2010-3091",
"datePublished": "2010-09-29T16:00:00Z",
"dateReserved": "2010-08-20T00:00:00Z",
"dateUpdated": "2024-09-17T01:26:50.830Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-6835 (GCVE-0-2008-6835)
Vulnerability from nvd – Published: 2009-06-27 18:00 – Updated: 2024-09-16 17:15
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in OpenID 5.x before 5.x-1.2, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:42:00.899Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "30165",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46938",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/46938"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/280592"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in OpenID 5.x before 5.x-1.2, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-06-27T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "30165",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46938",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/46938"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/280592"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31027"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6835",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in OpenID 5.x before 5.x-1.2, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "30165",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46938",
"refsource": "OSVDB",
"url": "http://osvdb.org/46938"
},
{
"name": "http://drupal.org/node/280592",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280592"
},
{
"name": "http://drupal.org/node/280593",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31027"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6835",
"datePublished": "2009-06-27T18:00:00Z",
"dateReserved": "2009-06-27T00:00:00Z",
"dateUpdated": "2024-09-16T17:15:08.648Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-6836 (GCVE-0-2008-6836)
Vulnerability from nvd – Published: 2009-06-27 18:00 – Updated: 2024-09-16 23:51
VLAI?
Summary
Cross-site request forgery (CSRF) vulnerability in OpenID 5.x before 5x.-1.2, a module for Drupal, allows remote attackers to hijack the authentication of unspecified victims to delete OpenID identities via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:42:00.864Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "30165",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46939",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/46939"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/280592"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site request forgery (CSRF) vulnerability in OpenID 5.x before 5x.-1.2, a module for Drupal, allows remote attackers to hijack the authentication of unspecified victims to delete OpenID identities via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-06-27T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "30165",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46939",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/46939"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/280592"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31027"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6836",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site request forgery (CSRF) vulnerability in OpenID 5.x before 5x.-1.2, a module for Drupal, allows remote attackers to hijack the authentication of unspecified victims to delete OpenID identities via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "30165",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30165"
},
{
"name": "46939",
"refsource": "OSVDB",
"url": "http://osvdb.org/46939"
},
{
"name": "http://drupal.org/node/280592",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280592"
},
{
"name": "http://drupal.org/node/280593",
"refsource": "CONFIRM",
"url": "http://drupal.org/node/280593"
},
{
"name": "31027",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31027"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6836",
"datePublished": "2009-06-27T18:00:00Z",
"dateReserved": "2009-06-27T00:00:00Z",
"dateUpdated": "2024-09-16T23:51:04.950Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}