Show plain JSON{"id": "CVE-2010-1958", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2010-06-21T19:30:01.943", "references": [{"url": "http://drupal.org/node/829808", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://osvdb.org/65611", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/40186", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.madirish.net/?article=461", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/40923", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59500", "source": "cve@mitre.org"}, {"url": "http://drupal.org/node/829808", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/65611", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/40186", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.madirish.net/?article=461", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/40923", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59500", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the FileField module 5.x before 5.x-2.5 and 6.x before 6.x-3.4 for Drupal allows remote authenticated users, with create or edit permissions and 'Path to File' or 'URL to File' display enabled, to inject arbitrary web script or HTML via the file name (filepath parameter)."}, {"lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo FileField v5.x anteriores a v5.x-2.5 y v6.x anteriores a v6.x-3.4 para Drupal. Permite a usuarios remotos autenticados, con permisos de creacci\u00f3n o edici\u00f3n y la caracter\u00edsitica de \"Ruta a fichero\" o \"URL a fichero\" activada, inyectar codigo de script web o c\u00f3digo HTML de su elecci\u00f3n a trav\u00e9s del nombre de fichero (par\u00e1metro filepath)."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-1.x-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "104D78D6-34CA-4779-9D41-807C2C89BD76"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21DF5C36-F84A-4008-869F-01FB6EF9913A"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0713728F-D5A1-4898-9042-8C2466966404"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86788078-AB86-431B-A36D-90A37FBDA083"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FC1CF20-8024-4DD7-A57F-F547E1BAFE82"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.3:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAB8E63D-9D9C-4681-8860-DE3829BC125E"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.3:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6E851FC-5241-48D2-A89D-960296DBE107"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.3:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75BF107F-4C49-4254-AD3D-BB5F327EB86C"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B7E07E3-9EB2-4E8F-8DCC-FF1A21648352"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:5.x-2.x-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0121B09D-8A5B-41A7-AF88-1C5E9DF2F8C3"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1E4D3FE-6B93-4888-9596-6419DEB7414D"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61B24B1E-980D-4272-AE2B-AF09D6C948D8"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF208318-2CB9-417F-9D92-C7D3D6688C1F"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3BE7A55-F2C4-441F-B40D-9253D13EC3C3"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C636D59-DF41-4824-A369-C9C07A096EE0"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-1.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B30E691-8BCE-412E-9E3E-037C15F0B585"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83FC3D58-5EDF-4F85-9652-9BF8826D1DC7"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B98C715F-CE0D-4AF9-9515-7220A10FA10C"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D8D9756-B97C-4A62-9739-67418E0EE537"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D11BE48A-3D97-4139-919B-4B43760744DF"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C371F3D3-3D4F-44CB-AD1C-802CF378E034"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DDD9453-D6EB-4D09-8781-B3C9F9ECE31F"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B727EAD-8690-446B-B931-72B43D6A8C09"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:alpha7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AE5855D-9B2E-4822-B022-98E4600D281D"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44C72DDE-97F1-4B58-AF7D-AFBE46615839"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FAE4259-7476-402E-8FEE-BD41CF895629"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F769591-CD7F-4931-9E38-A6606384E954"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7E863E5-D466-4A81-8870-795B9991F9F6"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "989E928E-AB25-4B0E-B23E-28825343EA59"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D594C4E-435D-4083-9FF3-A3533519BC77"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64F51F45-06D5-42A8-B0AC-ED403E218F3D"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3BF74CD-6272-4586-A2CB-2B5DDB6E6D27"}, {"criteria": "cpe:2.3:a:quicksketch:filefield:6.x-3.x-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F887AE9-1116-4460-AE88-54E92CCA49C7"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}