Cross-site scripting (XSS) vulnerability in the Hashcash module 6.x-2.x before 6.x-2.6 and 7.x-2.x before 7.x-2.2 for Drupal, when "Log failed hashcash" is enabled, allows remote attackers to inject arbitrary web script or HTML via an invalid token, which is not properly handled when administrators use the Database logging module.
References
Link | Resource |
---|---|
http://drupal.org/node/1650784 | Patch |
http://drupal.org/node/1650790 | Patch |
http://drupal.org/node/1663306 | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2012/10/04/3 |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2012-11-30 22:55
Updated : 2024-02-04 18:16
NVD link : CVE-2012-4469
Mitre link : CVE-2012-4469
CVE.ORG link : CVE-2012-4469
JSON object : View
Products Affected
simon_rycroft
- hashcash
drupal
- drupal
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')