Vulnerability Details : CVE-2010-1584
Cross-site scripting (XSS) vulnerability in the Context module before 6.x-2.0-rc4 for Drupal allows remote authenticated users, with Administer Blocks privileges, to inject arbitrary web script or HTML via a block description.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2010-1584
Probability of exploitation activity in the next 30 days: 0.11%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 44 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-1584
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:N/AC:H/Au:S/C:N/I:P/A:N |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2010-1584
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-1584
-
http://drupal.org/node/794718
XSS in Context Module [#794718] | Drupal.org
-
http://www.securityfocus.com/bid/40056
Drupal Context Module HTML Injection Vulnerability
-
http://drupal.org/cvs?commit=365210
All commits | Drupal.org
-
http://crackingdrupal.com/blog/greggles/mitigation-against-cve-2010-1584-drupal-context-module-xss
Mitigation against CVE-2010-1584 Drupal Context Module XSS | Cracking Drupal
-
http://drupal.org/node/795118
Access to this page has been denied.Patch
-
http://www.packetstormsecurity.com/1005-exploits/drupalab-xss.txt
Files ≈ Packet StormExploit
-
http://www.theregister.co.uk/2010/05/10/drupal_security_bug/
White House devs overlooked gaping Drupal vuln • The Register
-
http://www.madirish.net/?article=457
Mad Irish :: Drupal Context Module XSS
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/58521
Context module for Drupal administer blocks cross-site scripting CVE-2010-1584 Vulnerability Report
Products affected by CVE-2010-1584
- cpe:2.3:a:steven_jones:context:*:rc3:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:beta7:*:*:*:*:*:*
- cpe:2.3:a:steven_jones:context:6.x-2.0:alpha1:*:*:*:*:*:*