Show plain JSON{"id": "CVE-2012-5538", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2012-12-03T21:55:02.003", "references": [{"url": "http://drupal.org/node/1789300", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://drupal.org/node/1789302", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://drupal.org/node/1789306", "tags": ["Patch", "Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/11/20/4", "source": "secalert@redhat.com"}, {"url": "http://drupal.org/node/1789300", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://drupal.org/node/1789302", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://drupal.org/node/1789306", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/11/20/4", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the FileField Sources module 6.x-1.x before 6.x-1.6 and 7.x-1.x before 7.x-1.6 for Drupal, when the field has \"Reference existing\" source enabled, allows remote authenticated users to inject arbitrary web script or HTML via the filename of an uploaded file."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo FileField v6.x-1.x antes de v6.x-1.6 y v7.x-1.x antes de v7.x-1.6 para Drupal, cuando el campo tiene fuente \"Referencia existente\" activado, permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML a trav\u00e9s del nombre de archivo de un archivo cargado."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A67B47CB-0BDD-4A44-A356-28FFE1FB3113"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9EDE6AE-FF05-41FC-853D-87E39AF83D75"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8118B201-35B5-45F5-9484-D7B14CA2E00A"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0AE743E-186F-4ACB-82DC-491DCFE1AA5D"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "958D06E8-5DE8-4B40-83FE-E1669C888B7A"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AC75C81-97AE-4201-AA3C-D7114AEFC3C1"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:6.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F253681F-56D8-4D34-BD74-3E9A6653972B"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.2:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C272DA32-518F-4401-97F2-53BD096D6799"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F3A8434-FCEA-4654-BD19-3C7E6626A70D"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1560CFC5-72AF-425C-A6F1-E56192C0327C"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A9973B0-C6D8-4DD7-8E7D-67E5AE82654E"}, {"criteria": "cpe:2.3:a:nathan_haug:filefield_sources:7.x-1.x:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CEB17CA-912B-468D-B659-1E9C9CE5675B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "secalert@redhat.com"}