cve-2013-2123
Vulnerability from cvelistv5
Published
2013-08-28 15:00
Modified
2024-09-17 01:12
Severity ?
Summary
The Node access user reference module 6.x-3.x before 6.x-3.5 and 7.x-3.x before 7.x-3.10 for Drupal does not properly restrict access to content containing a user reference field when the author update/delete grants are enabled and the author's user account is deleted, which allows remote attackers to modify the content via unspecified vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:27:40.885Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130529 Re: CVE request for Drupal contributed modules",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/05/29/9"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2007122"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2007072"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://drupal.org/node/2007078"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Node access user reference module 6.x-3.x before 6.x-3.5 and 7.x-3.x before 7.x-3.10 for Drupal does not properly restrict access to content containing a user reference field when the author update/delete grants are enabled and the author\u0027s user account is deleted, which allows remote attackers to modify the content via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-28T15:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20130529 Re: CVE request for Drupal contributed modules",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/05/29/9"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://drupal.org/node/2007122"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://drupal.org/node/2007072"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://drupal.org/node/2007078"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-2123",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Node access user reference module 6.x-3.x before 6.x-3.5 and 7.x-3.x before 7.x-3.10 for Drupal does not properly restrict access to content containing a user reference field when the author update/delete grants are enabled and the author\u0027s user account is deleted, which allows remote attackers to modify the content via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20130529 Re: CVE request for Drupal contributed modules",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/05/29/9"
            },
            {
              "name": "https://drupal.org/node/2007122",
              "refsource": "MISC",
              "url": "https://drupal.org/node/2007122"
            },
            {
              "name": "https://drupal.org/node/2007072",
              "refsource": "CONFIRM",
              "url": "https://drupal.org/node/2007072"
            },
            {
              "name": "https://drupal.org/node/2007078",
              "refsource": "CONFIRM",
              "url": "https://drupal.org/node/2007078"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2123",
    "datePublished": "2013-08-28T15:00:00Z",
    "dateReserved": "2013-02-19T00:00:00Z",
    "dateUpdated": "2024-09-17T01:12:17.139Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-2123\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-08-28T22:55:05.597\",\"lastModified\":\"2013-10-07T17:48:51.880\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Node access user reference module 6.x-3.x before 6.x-3.5 and 7.x-3.x before 7.x-3.10 for Drupal does not properly restrict access to content containing a user reference field when the author update/delete grants are enabled and the author\u0027s user account is deleted, which allows remote attackers to modify the content via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo  de acceso de referencia al usuario Node  6.x-3.x anteior a  6.x-3.5 y  7.x-3.x anteior a  7.x-3.10 para Drupal no restringe adecuadamente el acceso al contenido que contiene un campo de referencia al usuario cuando el autor actualiza o elimina permisos y la cuenta de dicho autor es eliminada, lo que permite a atacantes remotos modificar el contenido a trav\u00e9s de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBE5478-9264-43E8-B209-0FD305DBDCF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAFC2DB6-1B50-47E9-BC0A-A8494B1A6065\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D3DFE5-E13E-4530-8B27-6B0069A1E382\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A725CA5-0CFB-4831-A0A8-073FF3C66B84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2111B174-19AF-4BF4-9BF4-DFE746E0FB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBEC2D16-2CE2-44A0-87FC-60F86F737790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC16573-5511-4F2A-A1F1-721A578DD8F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"853194F9-4C81-433D-AB9D-ABD073F8B6E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4992A3-91F1-4AC5-9D69-816303933B5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D51BCD81-C79C-4137-9730-3B5ABBCD3F02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40686E13-6B9B-4A9E-9CF5-9D285252E833\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:6.x-3.x:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0ACE4DA-D222-4E7E-AF9F-C6D91B0A6E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D7C3A9-B115-4FBD-92CE-9E64F6E6A38D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"30EBA365-05CF-453A-8BA9-DB1657BB8242\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"830C8950-84A5-45AC-A69A-8F4241540E99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"71CCE57F-54F0-4745-81F2-076C6B41C363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9231A15-9A87-4257-9DA2-FC2368DF39A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"37496C49-3DE6-43FD-AB0E-977667E85A3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03ADD1AC-1676-4C3F-9563-EA6E6D3A373D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9019F356-BDDE-4B81-9CF0-19877149B5F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC3B400D-9914-4EDF-9E38-FB0FD0A0B59C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06293CCC-DE5F-416B-AC34-C3BF663E8E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CA0E9C4-A663-43AB-BE7C-7E9E8E9CABDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF6B3EEC-BD76-48F6-A193-9ABEE882B292\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55915502-C217-439F-BDA7-255053EF8281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E2545F-0E07-4AC3-8F0E-E4D467AE23B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4782881F-450B-453C-AAE0-7800A7FB72EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:node_access_user_reference_project:nodeaccess_userreference_module:7.x-3.x:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5A78627-A0B3-4B87-A910-DA40EB784F41\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B1170D-AD33-4C7A-892D-63AC71B032CF\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2013/05/29/9\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://drupal.org/node/2007072\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://drupal.org/node/2007078\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://drupal.org/node/2007122\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.