cve-2012-5586
Vulnerability from cvelistv5
Published
2012-12-26 17:00
Modified
2024-08-06 21:14
Severity ?
Summary
The Services module 6.x-3.x before 6.x-3.3 and 7.x-3.x before 7.x-3.3 for Drupal allows remote authenticated users with the "access user profiles" permission to access arbitrary users' emails via vectors related to the "user index method" and "the path to the user resource."
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:14:15.921Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://drupal.org/node/1842026"
          },
          {
            "name": "56723",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/56723"
          },
          {
            "name": "[oss-security] 20121128 Re: CVE request for Drupal contributed modules",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/11/29/2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://drupal.org/node/1853200"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://drupal.org/node/1842022"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Services module 6.x-3.x before 6.x-3.3 and 7.x-3.x before 7.x-3.3 for Drupal allows remote authenticated users with the \"access user profiles\" permission to access arbitrary users\u0027 emails via vectors related to the \"user index method\" and \"the path to the user resource.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-26T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://drupal.org/node/1842026"
        },
        {
          "name": "56723",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/56723"
        },
        {
          "name": "[oss-security] 20121128 Re: CVE request for Drupal contributed modules",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/11/29/2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://drupal.org/node/1853200"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://drupal.org/node/1842022"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-5586",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Services module 6.x-3.x before 6.x-3.3 and 7.x-3.x before 7.x-3.3 for Drupal allows remote authenticated users with the \"access user profiles\" permission to access arbitrary users\u0027 emails via vectors related to the \"user index method\" and \"the path to the user resource.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://drupal.org/node/1842026",
              "refsource": "CONFIRM",
              "url": "http://drupal.org/node/1842026"
            },
            {
              "name": "56723",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/56723"
            },
            {
              "name": "[oss-security] 20121128 Re: CVE request for Drupal contributed modules",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/11/29/2"
            },
            {
              "name": "http://drupal.org/node/1853200",
              "refsource": "MISC",
              "url": "http://drupal.org/node/1853200"
            },
            {
              "name": "http://drupal.org/node/1842022",
              "refsource": "CONFIRM",
              "url": "http://drupal.org/node/1842022"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-5586",
    "datePublished": "2012-12-26T17:00:00",
    "dateReserved": "2012-10-24T00:00:00",
    "dateUpdated": "2024-08-06T21:14:15.921Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-5586\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-12-26T17:55:02.190\",\"lastModified\":\"2013-02-26T04:52:04.487\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Services module 6.x-3.x before 6.x-3.3 and 7.x-3.x before 7.x-3.3 for Drupal allows remote authenticated users with the \\\"access user profiles\\\" permission to access arbitrary users\u0027 emails via vectors related to the \\\"user index method\\\" and \\\"the path to the user resource.\\\"\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo Services v6.x-3.x antes de v6.x-3.3 y v7.x-3.x antes de v7.x-3.3 para Drupal permite a usuarios remotos autenticados con el permiso de \\\"acceso a perfiles de usuario\\\" para acceder a correos electr\u00f3nicos de usuarios de su elecci\u00f3n a trav\u00e9s de vectores relacionados con el \\\"m\u00e9todo del \u00edndice de usuario\\\" y \\\"la ruta de acceso al recurso de usuario\\\".\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:S/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":2.1},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8709726B-3CC9-4149-8FFA-57ACB47E1232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F8D4108-3D6C-4443-A27E-A0853A5398B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E59520DC-4B1D-4C78-846F-4A7E092C0B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0FF092C-EC93-4371-820B-3A25C0BEF666\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3149C6F6-9C91-4A8E-BEC0-B476D9B3CF1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB1E5589-AD4C-4535-B4E2-12665B8A6C45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8705011-0A2A-43CD-8FA8-D09DE0DFB586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"68E4D950-4F4E-4323-B18B-EEFCDB8F5D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:unstable1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75AD2A4-8CFB-4598-9D7B-C311731C49C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:unstable2:*:*:*:*:*:*\",\"matchCriteriaId\":\"21599548-D154-4AC6-9700-2AD02281B097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.0:unstable3:*:*:*:*:*:*\",\"matchCriteriaId\":\"990E06E3-3164-4A83-AAC0-64E39B02BD65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D9B12B8-1A47-48CD-9439-842EC59C8560\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA3972A6-A0CC-4F61-A6FF-D0B8B5139559\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:6.x-3.x:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF42B77-B1EB-4B06-941C-FC414568E0BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B1170D-AD33-4C7A-892D-63AC71B032CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0401AB3-8CD3-4191-BD67-FDEF8AC389E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F3E689-9099-4B52-A521-C9933CEC3A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF87F785-B660-4471-8525-8C38E4B1ED0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"92E55B94-035B-4C95-844A-994FC9098DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F178FBC3-11A0-4341-B930-7FD45F2E9391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC242C4-3283-4D6D-B69F-869E971D2102\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1A2F122-6D2C-42BC-8DA5-BBD19CE5FC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"57C52124-9EF2-448B-B768-A9CAAAF4F9A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"35055934-F01E-44DF-906B-B0B23BDBE9EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C2C7C6-AE59-4BCF-8296-591D6DBFD907\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"840E97FC-3BA3-43C9-AB0B-49267D75F529\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41060BF1-EFD1-449D-8D41-C6B898058DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:marc_ingram:services:7.x-3.x:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"32EBEE31-40E3-40A2-8FCB-EF726A1451EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B1170D-AD33-4C7A-892D-63AC71B032CF\"}]}]}],\"references\":[{\"url\":\"http://drupal.org/node/1842022\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://drupal.org/node/1842026\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://drupal.org/node/1853200\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/29/2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/56723\",\"source\":\"secalert@redhat.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.