Show plain JSON{"id": "CVE-2012-4486", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2012-11-02T15:55:01.247", "references": [{"url": "http://drupal.org/node/1700550", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://drupal.org/node/1700584", "tags": ["Patch", "Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/10/04/6", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/10/07/1", "source": "secalert@redhat.com"}, {"url": "http://drupal.org/node/1700550", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://drupal.org/node/1700584", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/10/04/6", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/10/07/1", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the Subuser module before 6.x-1.8 for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests that switch the user to a subuser via unspecified vectors."}, {"lang": "es", "value": "Una vulnerabilidad de Falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en el m\u00f3dulo Subuser antes de v6.x-1.8 para Drupal permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios de su elecci\u00f3n para las solicitudes que se cambian el rol de un usuario al de un subusuario a trav\u00e9s de vectores no especificados."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:boombatower:subuser:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27AB7A42-CF8E-491A-BE1E-FAB0A27633A8", "versionEndIncluding": "6.x-1.7"}, {"criteria": "cpe:2.3:a:boombatower:subuser:6.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37B4F4C5-5DF2-4FE4-B286-1EA735939F58"}, {"criteria": "cpe:2.3:a:boombatower:subuser:6.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9951DD27-13CE-4653-AE19-38B36B5B0715"}, {"criteria": "cpe:2.3:a:boombatower:subuser:6.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF71E6F0-9784-4799-811F-D94E5695DC55"}, {"criteria": "cpe:2.3:a:boombatower:subuser:6.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F53FE18-CE1E-4D8E-9CA5-314E392B7E83"}, {"criteria": "cpe:2.3:a:boombatower:subuser:6.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10515519-33EE-487B-A30C-16CA3E2BFEE1"}, {"criteria": "cpe:2.3:a:boombatower:subuser:6.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC97F0E1-0C56-4078-B372-C4E159A6B984"}, {"criteria": "cpe:2.3:a:boombatower:subuser:6.x-1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "322A1E39-F925-40DF-97B2-65DD2AE36BAD"}, {"criteria": "cpe:2.3:a:boombatower:subuser:6.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8FEC763-A6A7-4CC3-9EB2-33D76A6B76E6"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "secalert@redhat.com"}