CVE-2009-4559
 
Severity Score
3.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Cross-site scripting (XSS) vulnerability in the Submitted By module 6.x before 6.x-1.3 for Drupal allows remote authenticated users, with "administer content types" privileges, to inject arbitrary web script or HTML via an input string for "submitted by" text.
Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el módulo "Submitted By" v6.x anterior a v6.x-1.3 para Drupal permite a los usuarios remotos autenticados, con privilegios para "administrar los tipos de contenido", inyectar secuencias de comandos web o HTML de su elección a través de una cadena de entrada para el texto "submitted by".
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2010-01-04 CVE Reserved
- 2010-01-04 CVE Published
- 2024-02-22 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/35708 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51788 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://drupal.org/node/520372 | 2017-08-17 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nanwich Search vendor "Nanwich" | Submitted By Search vendor "Nanwich" for product "Submitted By" | 6.x-1.0 Search vendor "Nanwich" for product "Submitted By" and version "6.x-1.0" | - |
Affected
| in | Drupal Search vendor "Drupal" | Drupal Search vendor "Drupal" for product "Drupal" | * | - |
Safe
|
Nanwich Search vendor "Nanwich" | Submitted By Search vendor "Nanwich" for product "Submitted By" | 6.x-1.1 Search vendor "Nanwich" for product "Submitted By" and version "6.x-1.1" | - |
Affected
| in | Drupal Search vendor "Drupal" | Drupal Search vendor "Drupal" for product "Drupal" | * | - |
Safe
|
Nanwich Search vendor "Nanwich" | Submitted By Search vendor "Nanwich" for product "Submitted By" | 6.x-1.2 Search vendor "Nanwich" for product "Submitted By" and version "6.x-1.2" | - |
Affected
| in | Drupal Search vendor "Drupal" | Drupal Search vendor "Drupal" for product "Drupal" | * | - |
Safe
|
Nanwich Search vendor "Nanwich" | Submitted By Search vendor "Nanwich" for product "Submitted By" | 6.x-1.x-dev Search vendor "Nanwich" for product "Submitted By" and version "6.x-1.x-dev" | - |
Affected
| in | Drupal Search vendor "Drupal" | Drupal Search vendor "Drupal" for product "Drupal" | * | - |
Safe
|