cve-2012-5559
Vulnerability from cvelistv5
Published
2012-12-03 21:00
Modified
2024-08-06 21:14
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:14:16.313Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://drupal.org/node/1840992"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://drupal.org/node/1841030"
          },
          {
            "name": "51259",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51259"
          },
          {
            "name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-07-03T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://drupal.org/node/1840992"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://drupal.org/node/1841030"
        },
        {
          "name": "51259",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51259"
        },
        {
          "name": "[oss-security] 20121120 Re: CVE Request for Drupal Contributed Modules",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/11/20/4"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-5559",
    "datePublished": "2012-12-03T21:00:00",
    "dateReserved": "2012-10-24T00:00:00",
    "dateUpdated": "2024-08-06T21:14:16.313Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"707AD226-1D2E-46B5-9626-FDD99A5F7EEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha1:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"C5B9EF92-78B1-44DE-83C5-068199E0EE44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha2:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"2C05A815-09CB-4201-8345-89AE530D9925\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha3:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"492C9CF3-A6D8-4BC2-B9CE-6575BEF6C490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta1:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"3C89BFC4-CBFE-40D0-AF4B-D18750F8F83E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta2:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"7158E609-D504-4938-9651-2A782D319838\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta3:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"6CF31BF7-3BD2-4EA1-BEA1-C73E5AAD6779\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta4:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"C9EFC7E5-F1D7-4EB3-B185-A7CFDA961261\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:rc1:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"CA34F407-47D1-4F39-B26A-84FCD05EE6ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.1:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"0B3D4721-7320-423F-8E76-07E4D2E7F6DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.2:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"58C0D287-58A4-4C8D-9042-29042FA412F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.3:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"DE51E707-6ABD-431C-B3B7-89D514BFFC84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.4:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"DDC0B3F6-DF07-4E0A-8F37-3261AD144E6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.5:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"599655AB-52D9-47E8-B388-CFB4F75DB8D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.6:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"A7450146-5D5D-4681-99F1-2952AB0855B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.7:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"43E0AAD2-2937-4389-BF5E-A63A33723F1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.8:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"82843F45-7863-4D43-AAC6-E807356D16A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.9:*:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"754DAD0C-555C-41E8-8384-CD5A21442992\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.x:dev:*:*:*:drupal:*:*\", \"matchCriteriaId\": \"4437675C-D86D-4903-9641-3AA3D28BD9F2\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de ejecuci\\u00f3n de secuencias de comandos en sitios cruzados (XSS) en page manager node view task en el m\\u00f3dulo  Chaos tool suite (ctools) v6.x-1.x antes de v6.x-1.10 para Drupal permite a usuarios remotos autenticados con los permisos para enviar o modificar nodos inyectar secuencias de comandos web o HTML a trav\\u00e9s del t\\u00edtulo de la p\\u00e1gina.\"}]",
      "id": "CVE-2012-5559",
      "lastModified": "2024-11-21T01:44:53.140",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:N/I:P/A:N\", \"baseScore\": 2.6, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 4.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2012-12-03T21:55:02.847",
      "references": "[{\"url\": \"http://drupal.org/node/1840992\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://drupal.org/node/1841030\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/51259\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/11/20/4\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://drupal.org/node/1840992\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://drupal.org/node/1841030\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/51259\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/11/20/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-5559\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-12-03T21:55:02.847\",\"lastModified\":\"2024-11-21T01:44:53.140\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the page manager node view task in the Chaos tool suite (ctools) module 6.x-1.x before 6.x-1.10 for Drupal allows remote authenticated users with permissions to submit or edit nodes to inject arbitrary web script or HTML via the page title.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en page manager node view task en el m\u00f3dulo  Chaos tool suite (ctools) v6.x-1.x antes de v6.x-1.10 para Drupal permite a usuarios remotos autenticados con los permisos para enviar o modificar nodos inyectar secuencias de comandos web o HTML a trav\u00e9s del t\u00edtulo de la p\u00e1gina.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"707AD226-1D2E-46B5-9626-FDD99A5F7EEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"C5B9EF92-78B1-44DE-83C5-068199E0EE44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha2:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"2C05A815-09CB-4201-8345-89AE530D9925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:alpha3:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"492C9CF3-A6D8-4BC2-B9CE-6575BEF6C490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"3C89BFC4-CBFE-40D0-AF4B-D18750F8F83E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta2:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"7158E609-D504-4938-9651-2A782D319838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta3:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"6CF31BF7-3BD2-4EA1-BEA1-C73E5AAD6779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:beta4:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"C9EFC7E5-F1D7-4EB3-B185-A7CFDA961261\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.0:rc1:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"CA34F407-47D1-4F39-B26A-84FCD05EE6ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.1:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"0B3D4721-7320-423F-8E76-07E4D2E7F6DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.2:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"58C0D287-58A4-4C8D-9042-29042FA412F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.3:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"DE51E707-6ABD-431C-B3B7-89D514BFFC84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.4:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"DDC0B3F6-DF07-4E0A-8F37-3261AD144E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.5:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"599655AB-52D9-47E8-B388-CFB4F75DB8D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.6:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"A7450146-5D5D-4681-99F1-2952AB0855B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.7:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"43E0AAD2-2937-4389-BF5E-A63A33723F1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.8:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"82843F45-7863-4D43-AAC6-E807356D16A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.9:*:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"754DAD0C-555C-41E8-8384-CD5A21442992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:chaos_tool_suite_project:ctools:6.x-1.x:dev:*:*:*:drupal:*:*\",\"matchCriteriaId\":\"4437675C-D86D-4903-9641-3AA3D28BD9F2\"}]}]}],\"references\":[{\"url\":\"http://drupal.org/node/1840992\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://drupal.org/node/1841030\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/51259\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/20/4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://drupal.org/node/1840992\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://drupal.org/node/1841030\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/51259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/20/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.