First published: Tue Aug 14 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the RealName module 6.x-1.x before 6.x-1.5 for Drupal allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) "user names in page titles" and (2) "autocomplete callbacks."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Realname | =6.x-1.2 | |
Nancy Wichmann Realname | =6.x-1.0 | |
Nancy Wichmann Realname | =6.x-1.0-alpha1 | |
Nancy Wichmann Realname | =6.x-1.0-beta | |
Nancy Wichmann Realname | =6.x-1.1 | |
Nancy Wichmann Realname | =6.x-1.1-rc1 | |
Nancy Wichmann Realname | =6.x-1.1-rc2 | |
Nancy Wichmann Realname | =6.x-1.1-rc3 | |
Nancy Wichmann Realname | =6.x-1.2 | |
Nancy Wichmann Realname | =6.x-1.3 | |
Nancy Wichmann Realname | =6.x-1.4 | |
Nancy Wichmann Realname | =6.x-1.x-dev | |
Drupal Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2298 has a medium severity rating due to the potential for remote attackers to exploit cross-site scripting vulnerabilities.
To fix CVE-2012-2298, you should update the RealName module to version 6.x-1.5 or later.
CVE-2012-2298 affects RealName module versions prior to 6.x-1.5, including versions 6.x-1.0 through 6.x-1.4.
The attack vectors for CVE-2012-2298 include user names in page titles and autocomplete callbacks.
Remote attackers can exploit CVE-2012-2298 to inject arbitrary web scripts or HTML, potentially impacting users of the affected Drupal sites.