FKIE_CVE-2012-2719

Vulnerability from fkie_nvd - Published: 2012-06-27 00:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The filedepot module 6.x-1.x before 6.x-1.3 for Drupal, when accessed using multiple different browsers from the same IP address, causes Internet Explorer sessions to "switch users" when uploading a file, which has unspecified impact possibly involving file uploads to the wrong user directory, aka "Session Management Vulnerability."
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:blaine_lang:filedepot:6.x-1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9CDE75-41B9-497B-AC2E-53CD0920B493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:blaine_lang:filedepot:6.x-1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "84629523-4848-4734-91B7-ADB05911BF5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:blaine_lang:filedepot:6.x-1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "29A2B3FD-BB38-4AD5-9E7F-7B81E5B3C77D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:blaine_lang:filedepot:6.x-1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E908CEA1-81DE-47FA-91B9-621DB1351F66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:blaine_lang:filedepot:6.x-1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "8F36014D-DB17-4650-9920-BA282E0FBD5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:blaine_lang:filedepot:6.x-1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5019B80-6084-412F-9A74-EDC4553F9612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:blaine_lang:filedepot:6.x-1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "07103F4F-4475-4821-BDDB-3A8B6E12BDCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:blaine_lang:filedepot:6.x-1.x:dev:*:*:*:*:*:*",
              "matchCriteriaId": "2E336526-EC32-442D-86BF-9C6760DDA638",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The filedepot module 6.x-1.x before 6.x-1.3 for Drupal, when accessed using multiple different browsers from the same IP address, causes Internet Explorer sessions to \"switch users\" when uploading a file, which has unspecified impact possibly involving file uploads to the wrong user directory, aka \"Session Management Vulnerability.\""
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo fileDepot v6.x-1.x anterior a v6.x-1.3 para Drupal, cuando se accede con diversos navegadores diferentes a la misma direcci\u00f3n IP, causa que las sesiones de Internet Explorer cambien de usuario al cargar un archivo, el cual tiene un impacto no especificado el cual comprende la carga de un fichero al directorio de un usuario incorrecto. Tambi\u00e9n conocido como vulnerabilidad de \"Gesti\u00f3n de Sesi\u00f3n\""
    }
  ],
  "id": "CVE-2012-2719",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-27T00:55:04.880",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://drupal.org/node/1598782"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/1608864"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49316"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/82575"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://drupal.org/node/1598782"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://drupal.org/node/1608864"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/06/14/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/82575"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…