Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Hashcash module 6.x-2.x before 6.x-2.6 and 7.x-2.x before 7.x-2.2 for Drupal, when "Log failed hashcash" is enabled, allows remote attackers to inject arbitrary web script or HTML via an invalid token, which is not properly handled when administrators use the Database logging module.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Simon Rycroft | Hashcash | 6.x-2.0 |
| Drupal | Drupal | - |
Related Weaknesses (CWE)
References
- http://drupal.org/node/1650784Patch
- http://drupal.org/node/1650790Patch
- http://drupal.org/node/1663306PatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2012/10/04/3
- http://drupal.org/node/1650784Patch
- http://drupal.org/node/1650790Patch
- http://drupal.org/node/1663306PatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2012/10/04/3
FAQ
What is CVE-2012-4469?
CVE-2012-4469 is a vulnerability with a CVSS score of 2.6 (LOW). Cross-site scripting (XSS) vulnerability in the Hashcash module 6.x-2.x before 6.x-2.6 and 7.x-2.x before 7.x-2.2 for Drupal, when "Log failed hashcash" is enabled, allows remote attackers to inject a...
How severe is CVE-2012-4469?
CVE-2012-4469 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-4469?
Check the references section above for vendor advisories and patch information. Affected products include: Simon Rycroft Hashcash, Drupal Drupal.