Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:larry_garfield:autosave:*:*:*:*:*:*:*:*", "matchCriteriaId": "F60D83D8-B57E-4489-BBE5-A4EDDBC6F186", "versionEndIncluding": "6.x-2.9", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.0:*:*:*:*:*:*:*", "matchCriteriaId": "FF55867A-2AF9-4B8E-8272-ACF1C2BAED73", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3F4926CD-AD5A-48B8-B0DF-2DB93C38F8EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.2:*:*:*:*:*:*:*", "matchCriteriaId": "20117362-653E-461E-A65E-5CFBD3261BD3", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.3:*:*:*:*:*:*:*", "matchCriteriaId": "33B5C97D-3533-44AF-AAEF-62D04ADDCB4D", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.4:*:*:*:*:*:*:*", "matchCriteriaId": "8239963A-282D-4907-83EB-C4EB5AE84A92", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7536D05-E550-487C-A7D4-0D4D004FB5A5", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.6:*:*:*:*:*:*:*", "matchCriteriaId": "AE3D774E-E3B3-4ADD-A9C4-968BFCDC832D", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.7:*:*:*:*:*:*:*", "matchCriteriaId": "36D6B262-4BC1-4DAF-A974-60A4CBAE5081", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.8:*:*:*:*:*:*:*", "matchCriteriaId": "DA9A7E88-C089-4058-89D5-07B9150DB215", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:6.x-2.x:dev:*:*:*:*:*:*", "matchCriteriaId": "FD0D8665-EB69-4BC0-8E6A-CAD5C50EACA6", "vulnerable": true}, {"criteria": "cpe:2.3:a:larry_garfield:autosave:7.x-2.x:dev:*:*:*:*:*:*", "matchCriteriaId": "9ADDE438-86F9-4757-9EDA-A6E134198AFA", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the Autosave module 6.x before 6.x-2.10 and 7.x-2.x before 7.x-2.0 for Drupal allows remote attackers to hijack the authentication of arbitrary users for requests involving \"submitting saved results to a node.\""}, {"lang": "es", "value": "Una vulnerabilidad de falsificaci\u00f3n de peticiones en sitios cruzados (CSRF) en el m\u00f3dulo de guardado autom\u00e1tico (AutoSave) v6.x antes de v6.x-2.10 y v7.x-2.x antes de v7.x-2.0 para Drupal permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios de su elecci\u00f3n que realicen solicitudes que incluyan \"el env\u00edo de resultados guardados a un nodo.\"\r\n"}], "id": "CVE-2012-2097", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2012-08-14T21:55:01.317", "references": [{"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://drupal.org/node/1525998"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/1528864"}, {"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://drupal.org/node/1528906"}, {"source": "secalert@redhat.com", "tags": ["Exploit", "Patch"], "url": "http://drupalcode.org/project/autosave.git/commitdiff/39f7fb0"}, {"source": "secalert@redhat.com", "tags": ["Exploit", "Patch"], "url": "http://drupalcode.org/project/autosave.git/commitdiff/f7bfd2d"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/11/4"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/12/2"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52985"}, {"source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74838"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://drupal.org/node/1525998"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/1528864"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://drupal.org/node/1528906"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch"], "url": "http://drupalcode.org/project/autosave.git/commitdiff/39f7fb0"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Patch"], "url": "http://drupalcode.org/project/autosave.git/commitdiff/f7bfd2d"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/11/4"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/12/2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52985"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74838"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-352"}], "source": "nvd@nist.gov", "type": "Primary"}]}