ID

VAR-201209-0645


CVE

CVE-2012-2064


TITLE

Drupal for Views Language Switcher Cross-site scripting vulnerability in module

Trust: 0.8

sources: JVNDB: JVNDB-2012-004081

DESCRIPTION

Cross-site scripting (XSS) vulnerability in theme/views_lang_switch.theme.inc in the Views Language Switcher module before 7.x-1.2 for Drupal allows remote attackers to inject arbitrary web script or HTML via the q parameter. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Versions prior to Views Language Switcher 7.x-1.2 are vulnerable. Drupal is a free and open source content management system developed in PHP language maintained by the Drupal community. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Drupal Views Language Switcher Module "q" Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA48355 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48355/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48355 RELEASE DATE: 2012-03-15 DISCUSS ADVISORY: http://secunia.com/advisories/48355/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48355/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48355 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in the Views Language Switcher module for Drupal, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to the "q" parameter is not properly sanitised in theme/views_lang_switch.theme.inc before being returned to the user. SOLUTION: Update to version 7.x-1.2. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: SA-CONTRIB-2012-038: http://drupal.org/node/1482420 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-2064 // JVNDB: JVNDB-2012-004081 // BID: 52497 // VULHUB: VHN-55345 // PACKETSTORM: 110852

AFFECTED PRODUCTS

vendor:mark theunissenmodel:views lang switchscope:eqversion:7.x-1.x

Trust: 1.6

vendor:mark theunissenmodel:views lang switchscope:eqversion:7.x-1.0

Trust: 1.6

vendor:mark theunissenmodel:views lang switchscope:lteversion:7.x-1.1

Trust: 1.0

vendor:views language switchermodel:views language switcherscope:ltversion:7.x-1.2

Trust: 0.8

vendor:mark theunissenmodel:views lang switchscope:eqversion:7.x-1.1

Trust: 0.6

vendor:drupalmodel:views language switcherscope:eqversion:7.x-1.1

Trust: 0.3

vendor:drupalmodel:views language switcherscope:neversion:7.x-1.2

Trust: 0.3

sources: BID: 52497 // JVNDB: JVNDB-2012-004081 // CNNVD: CNNVD-201203-305 // NVD: CVE-2012-2064

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-2064
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-2064
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201203-305
value: MEDIUM

Trust: 0.6

VULHUB: VHN-55345
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-2064
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-55345
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-55345 // JVNDB: JVNDB-2012-004081 // CNNVD: CNNVD-201203-305 // NVD: CVE-2012-2064

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-55345 // JVNDB: JVNDB-2012-004081 // NVD: CVE-2012-2064

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-305

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 110852 // CNNVD: CNNVD-201203-305

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004081

PATCH

title:project/views_lang_switch.git / commiturl:http://drupalcode.org/project/views_lang_switch.git/commit/c27c318

Trust: 0.8

title:views_lang_switch 7.x-1.2url:http://drupal.org/node/1482268

Trust: 0.8

title:DRUPAL-SA-CONTRIB-2012-038url:http://drupal.org/node/1482420

Trust: 0.8

sources: JVNDB: JVNDB-2012-004081

EXTERNAL IDS

db:NVDid:CVE-2012-2064

Trust: 2.8

db:BIDid:52497

Trust: 2.0

db:SECUNIAid:48355

Trust: 1.8

db:OPENWALLid:OSS-SECURITY/2012/04/07/1

Trust: 1.7

db:OSVDBid:80071

Trust: 1.7

db:JVNDBid:JVNDB-2012-004081

Trust: 0.8

db:CNNVDid:CNNVD-201203-305

Trust: 0.7

db:MLISTid:[OSS-SECURITY] 20120406 CVE'S FOR DRUPAL CONTRIB 2012 001 THROUGH 057 (67 NEW CVE ASSIGNMENTS)

Trust: 0.6

db:VULHUBid:VHN-55345

Trust: 0.1

db:PACKETSTORMid:110852

Trust: 0.1

sources: VULHUB: VHN-55345 // BID: 52497 // JVNDB: JVNDB-2012-004081 // PACKETSTORM: 110852 // CNNVD: CNNVD-201203-305 // NVD: CVE-2012-2064

REFERENCES

url:http://drupal.org/node/1482420

Trust: 2.1

url:http://www.securityfocus.com/bid/52497

Trust: 1.7

url:http://drupalcode.org/project/views_lang_switch.git/commit/c27c318

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2012/04/07/1

Trust: 1.7

url:http://www.osvdb.org/80071

Trust: 1.7

url:http://secunia.com/advisories/48355

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2064

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2064

Trust: 0.8

url:http://www.drupal.org

Trust: 0.3

url:http://drupal.org/project/views_lang_switch

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48355

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/advisories/48355/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/48355/#comments

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-55345 // BID: 52497 // JVNDB: JVNDB-2012-004081 // PACKETSTORM: 110852 // CNNVD: CNNVD-201203-305 // NVD: CVE-2012-2064

CREDITS

Chris Ruppel

Trust: 0.9

sources: BID: 52497 // CNNVD: CNNVD-201203-305

SOURCES

db:VULHUBid:VHN-55345
db:BIDid:52497
db:JVNDBid:JVNDB-2012-004081
db:PACKETSTORMid:110852
db:CNNVDid:CNNVD-201203-305
db:NVDid:CVE-2012-2064

LAST UPDATE DATE

2024-11-23T21:06:45.144000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-55345date:2012-09-05T00:00:00
db:BIDid:52497date:2015-03-08T16:04:00
db:JVNDBid:JVNDB-2012-004081date:2012-09-06T00:00:00
db:CNNVDid:CNNVD-201203-305date:2012-03-16T00:00:00
db:NVDid:CVE-2012-2064date:2024-11-21T01:38:25.100

SOURCES RELEASE DATE

db:VULHUBid:VHN-55345date:2012-09-05T00:00:00
db:BIDid:52497date:2012-03-14T00:00:00
db:JVNDBid:JVNDB-2012-004081date:2012-09-06T00:00:00
db:PACKETSTORMid:110852date:2012-03-15T06:37:43
db:CNNVDid:CNNVD-201203-305date:2012-03-16T00:00:00
db:NVDid:CVE-2012-2064date:2012-09-05T00:55:15.047