Vulnerability Details : CVE-2012-2300
Multiple cross-site scripting (XSS) vulnerabilities in the Ubercart module 6.x-2.x before 6.x-2.8 and 7.x-3.x before 7.x-3.1 for Drupal allow remote authenticated users with the administer product classes permission to inject arbitrary web script or HTML via unspecified vectors.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2012-2300
Probability of exploitation activity in the next 30 days: 0.09%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 36 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-2300
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:N/AC:H/Au:S/C:N/I:P/A:N |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2012-2300
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2300
-
http://drupal.org/node/1547508
ubercart 7.x-3.1 | Drupal.orgPatch
-
http://drupalcode.org/project/ubercart.git/commitdiff/3e7c0b8
Access to this page has been denied.Exploit;Patch
-
http://www.openwall.com/lists/oss-security/2012/05/03/2
oss-security - Re: CVE Request for Drupal contributed modules
-
http://drupal.org/node/1547674
Access to this page has been denied.Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/53251
Drupal Ubercart Module Multiple Security Vulnerabilities
-
http://drupalcode.org/project/ubercart.git/commitdiff/dfd8658
Access to this page has been denied.Exploit;Patch
-
http://drupal.org/node/1547506
Access to this page has been denied.Patch
-
http://www.openwall.com/lists/oss-security/2012/05/03/1
oss-security - CVE Request for Drupal contributed modules
Products affected by CVE-2012-2300
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:dev:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc6:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:rc7:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.7:*:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.4:*:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:dev:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:alpha3:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.3:*:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:*:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.2:*:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:6.x-2.6:*:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:ubercart:ubercart:7.x-3.0:alpha1:*:*:*:*:*:*