fkie_cve-2012-4486
Vulnerability from fkie_nvd
Published
2012-11-02 15:55
Modified
2024-11-21 01:42
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in the Subuser module before 6.x-1.8 for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that switch the user to a subuser via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
boombatower | subuser | * | |
boombatower | subuser | 6.x-1.0 | |
boombatower | subuser | 6.x-1.1 | |
boombatower | subuser | 6.x-1.2 | |
boombatower | subuser | 6.x-1.3 | |
boombatower | subuser | 6.x-1.4 | |
boombatower | subuser | 6.x-1.5 | |
boombatower | subuser | 6.x-1.6 | |
boombatower | subuser | 6.x-1.x | |
drupal | drupal | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:boombatower:subuser:*:*:*:*:*:*:*:*", matchCriteriaId: "27AB7A42-CF8E-491A-BE1E-FAB0A27633A8", versionEndIncluding: "6.x-1.7", vulnerable: true, }, { criteria: "cpe:2.3:a:boombatower:subuser:6.x-1.0:*:*:*:*:*:*:*", matchCriteriaId: "37B4F4C5-5DF2-4FE4-B286-1EA735939F58", vulnerable: true, }, { criteria: "cpe:2.3:a:boombatower:subuser:6.x-1.1:*:*:*:*:*:*:*", matchCriteriaId: "9951DD27-13CE-4653-AE19-38B36B5B0715", vulnerable: true, }, { criteria: "cpe:2.3:a:boombatower:subuser:6.x-1.2:*:*:*:*:*:*:*", matchCriteriaId: "BF71E6F0-9784-4799-811F-D94E5695DC55", vulnerable: true, }, { criteria: "cpe:2.3:a:boombatower:subuser:6.x-1.3:*:*:*:*:*:*:*", matchCriteriaId: "5F53FE18-CE1E-4D8E-9CA5-314E392B7E83", vulnerable: true, }, { criteria: "cpe:2.3:a:boombatower:subuser:6.x-1.4:*:*:*:*:*:*:*", matchCriteriaId: "10515519-33EE-487B-A30C-16CA3E2BFEE1", vulnerable: true, }, { criteria: "cpe:2.3:a:boombatower:subuser:6.x-1.5:*:*:*:*:*:*:*", matchCriteriaId: "BC97F0E1-0C56-4078-B372-C4E159A6B984", vulnerable: true, }, { criteria: "cpe:2.3:a:boombatower:subuser:6.x-1.6:*:*:*:*:*:*:*", matchCriteriaId: "322A1E39-F925-40DF-97B2-65DD2AE36BAD", vulnerable: true, }, { criteria: "cpe:2.3:a:boombatower:subuser:6.x-1.x:dev:*:*:*:*:*:*", matchCriteriaId: "F8FEC763-A6A7-4CC3-9EB2-33D76A6B76E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", matchCriteriaId: "F8B1170D-AD33-4C7A-892D-63AC71B032CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site request forgery (CSRF) vulnerability in the Subuser module before 6.x-1.8 for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that switch the user to a subuser via unspecified vectors.", }, { lang: "es", value: "Una vulnerabilidad de Falsificación de petición en sitios cruzados (CSRF) en el módulo Subuser antes de v6.x-1.8 para Drupal permite a atacantes remotos secuestrar la autenticación de usuarios de su elección para las solicitudes que se cambian el rol de un usuario al de un subusuario a través de vectores no especificados.", }, ], id: "CVE-2012-4486", lastModified: "2024-11-21T01:42:59.467", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2012-11-02T15:55:01.247", references: [ { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://drupal.org/node/1700550", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://drupal.org/node/1700584", }, { source: "secalert@redhat.com", url: "http://www.openwall.com/lists/oss-security/2012/10/04/6", }, { source: "secalert@redhat.com", url: "http://www.openwall.com/lists/oss-security/2012/10/07/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://drupal.org/node/1700550", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://drupal.org/node/1700584", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2012/10/04/6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openwall.com/lists/oss-security/2012/10/07/1", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.