cve-2012-5559
Vulnerability from cvelistv5
Published
2012-12-03 21:00
Modified
2024-08-06 21:14
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:14:16.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://drupal.org/node/1840992" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://drupal.org/node/1841030" }, { "name": "51259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51259" }, { "name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-03T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://drupal.org/node/1840992" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://drupal.org/node/1841030" }, { "name": "51259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51259" }, { "name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-5559", "datePublished": "2012-12-03T21:00:00", "dateReserved": "2012-10-24T00:00:00", "dateUpdated": "2024-08-06T21:14:16.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"707AD226-1D2E-46B5-9626-FDD99A5F7EEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha1:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"C5B9EF92-78B1-44DE-83C5-068199E0EE44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha2:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"2C05A815-09CB-4201-8345-89AE530D9925\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha3:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"492C9CF3-A6D8-4BC2-B9CE-6575BEF6C490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta1:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"3C89BFC4-CBFE-40D0-AF4B-D18750F8F83E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta2:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"7158E609-D504-4938-9651-2A782D319838\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta3:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"6CF31BF7-3BD2-4EA1-BEA1-C73E5AAD6779\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta4:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"C9EFC7E5-F1D7-4EB3-B185-A7CFDA961261\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:rc1:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"CA34F407-47D1-4F39-B26A-84FCD05EE6ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.1:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"0B3D4721-7320-423F-8E76-07E4D2E7F6DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.2:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"58C0D287-58A4-4C8D-9042-29042FA412F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.3:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"DE51E707-6ABD-431C-B3B7-89D514BFFC84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.4:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"DDC0B3F6-DF07-4E0A-8F37-3261AD144E6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.5:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"599655AB-52D9-47E8-B388-CFB4F75DB8D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.6:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"A7450146-5D5D-4681-99F1-2952AB0855B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.7:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"43E0AAD2-2937-4389-BF5E-A63A33723F1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.8:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"82843F45-7863-4D43-AAC6-E807356D16A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.9:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"754DAD0C-555C-41E8-8384-CD5A21442992\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.x:dev:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"4437675C-D86D-4903-9641-3AA3D28BD9F2\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de ejecuci\\u00f3n de secuencias de comandos en sitios cruzados (XSS) en page manager node view task en el m\\u00f3dulo Chaos tool suite (ctools) v6.x-1.x antes de v6.x-1.10 para Drupal permite a usuarios remotos autenticados con los permisos para enviar o modificar nodos inyectar secuencias de comandos web o HTML a trav\\u00e9s del t\\u00edtulo de la p\\u00e1gina.\"}]", "id": "CVE-2012-5559", "lastModified": "2024-11-21T01:44:53.140", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:N/I:P/A:N\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2012-12-03T21:55:02.847", "references": "[{\"url\": \"http://drupal.org/node/1840992\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://drupal.org/node/1841030\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/51259\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/11/20/4\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://drupal.org/node/1840992\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://drupal.org/node/1841030\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/51259\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/11/20/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2012-5559\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-12-03T21:55:02.847\",\"lastModified\":\"2024-11-21T01:44:53.140\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en page manager node view task en el m\u00f3dulo Chaos tool suite (ctools) v6.x-1.x antes de v6.x-1.10 para Drupal permite a usuarios remotos autenticados con los permisos para enviar o modificar nodos inyectar secuencias de comandos web o HTML a trav\u00e9s del t\u00edtulo de la p\u00e1gina.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"707AD226-1D2E-46B5-9626-FDD99A5F7EEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"C5B9EF92-78B1-44DE-83C5-068199E0EE44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha2:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"2C05A815-09CB-4201-8345-89AE530D9925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha3:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"492C9CF3-A6D8-4BC2-B9CE-6575BEF6C490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"3C89BFC4-CBFE-40D0-AF4B-D18750F8F83E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta2:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"7158E609-D504-4938-9651-2A782D319838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta3:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"6CF31BF7-3BD2-4EA1-BEA1-C73E5AAD6779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta4:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"C9EFC7E5-F1D7-4EB3-B185-A7CFDA961261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:rc1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"CA34F407-47D1-4F39-B26A-84FCD05EE6ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.1:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"0B3D4721-7320-423F-8E76-07E4D2E7F6DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.2:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"58C0D287-58A4-4C8D-9042-29042FA412F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.3:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"DE51E707-6ABD-431C-B3B7-89D514BFFC84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.4:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"DDC0B3F6-DF07-4E0A-8F37-3261AD144E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.5:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"599655AB-52D9-47E8-B388-CFB4F75DB8D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.6:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"A7450146-5D5D-4681-99F1-2952AB0855B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.7:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"43E0AAD2-2937-4389-BF5E-A63A33723F1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.8:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"82843F45-7863-4D43-AAC6-E807356D16A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.9:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"754DAD0C-555C-41E8-8384-CD5A21442992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.x:dev:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"4437675C-D86D-4903-9641-3AA3D28BD9F2\"}]}]}],\"references\":[{\"url\":\"http://drupal.org/node/1840992\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://drupal.org/node/1841030\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/51259\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/20/4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://drupal.org/node/1840992\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://drupal.org/node/1841030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/51259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/20/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.