First published: Wed Dec 26 2012(Updated: )
The Email Field module 6.x-1.x before 6.x-1.3 for Drupal, when using a field permission module and the field contact field formatter is set to the full or teaser display mode, does not properly check permissions, which allows remote attackers to email the stored address via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Epiqo Email | =6.x-1.0 | |
Epiqo Email | =6.x-1.0-rc1 | |
Epiqo Email | =6.x-1.1 | |
Epiqo Email | =6.x-1.2 | |
Epiqo Email | =6.x-1.x-dev | |
Drupal Drupal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5588 has been classified as a Medium severity vulnerability due to its potential for unauthorized email access.
To fix CVE-2012-5588, upgrade the Email Field module to version 6.x-1.3 or later.
CVE-2012-5588 affects the Email Field module versions 6.x-1.0, 6.x-1.0-rc1, 6.x-1.1, and 6.x-1.2.
CVE-2012-5588 allows remote attackers to send emails using stored addresses without proper permission checks.
Website administrators using the vulnerable versions of the Email Field module on Drupal sites are at risk due to CVE-2012-5588.