First published: Tue Sep 25 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the FAQ module 6.x-1.x before 6.x-1.13 and 7.x-1.x-rc1 for Drupal allow remote authenticated users to inject arbitrary web script or HTML via the (1) title parameter in faq.admin.inc or (2) detailed_question parameter in faq.module.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Faq | =6.x-1.0 | |
Drupal Faq | =6.x-1.1 | |
Drupal Faq | =6.x-1.2 | |
Drupal Faq | =6.x-1.3 | |
Drupal Faq | =6.x-1.4 | |
Drupal Faq | =6.x-1.5 | |
Drupal Faq | =6.x-1.6 | |
Drupal Faq | =6.x-1.7 | |
Drupal Faq | =6.x-1.8 | |
Drupal Faq | =6.x-1.9 | |
Drupal Faq | =6.x-1.10 | |
Drupal Faq | =6.x-1.11 | |
Drupal Faq | =6.x-1.12 | |
Drupal Faq | =6.x-1.x | |
Drupal Faq | =7x-1.x-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1646 has been classified as a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2012-1646, update the Drupal FAQ module to version 6.x-1.13 or later, or 7.x-1.x-rc2 or later.
CVE-2012-1646 affects Drupal users with the FAQ module versions prior to 6.x-1.13 and 7.x-1.x-rc2.
CVE-2012-1646 can be exploited through cross-site scripting (XSS), allowing attackers to inject arbitrary web scripts or HTML.
Yes, remote authenticated users are required to exploit CVE-2012-1646 due to its nature of requiring access to specific parameters.