Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF52E04C-FA27-4A40-8C65-E3195EFDDBAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "BB103093-A42E-42BF-99F6-87E7CFC8B202", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "B3FBBCE5-CBE9-44C2-968B-4AC9C3C9BEFE", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "5BB069EF-CF7C-4E09-A710-C3526E0439B9", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "39C15145-C442-4DB1-944D-8CAC20D475C6", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:alpha5:*:*:*:*:*:*", "matchCriteriaId": "F5499411-30C0-49AE-A86A-0CAE4776EEC0", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "050AE8CD-38A6-422F-BF37-91562EBA1753", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta10:*:*:*:*:*:*", "matchCriteriaId": "2126DE43-B110-4091-BF89-89B19A65FFC8", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta11:*:*:*:*:*:*", "matchCriteriaId": "39A44978-D60E-4BC8-8686-D37DB1A11E8B", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "88A49A47-BED7-4316-BDB0-B861AF4ACF1A", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "DFD9AD40-89F5-45AE-B4A5-090F39E510E0", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "BFCF6DBC-9791-424B-BC65-DC5C990F9C83", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "05AEB8FF-3D71-43F0-B315-B85A8088B45B", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "CE0BAD57-71F6-4D5C-B586-9BFF96A6538C", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "E7CD6834-3118-4609-8F30-3D539DE57F12", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "B10F2925-F3D6-4221-8925-92D1DD9CA6F0", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.0:beta9:*:*:*:*:*:*", "matchCriteriaId": "437992A2-01B5-4A8C-ABE5-3E7E575FA19F", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA56AC18-8534-4A52-8DA8-1295BD42FC77", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F878269-B46B-4FF1-9064-8418878C3716", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.x:*:*:*:*:*:*:*", "matchCriteriaId": "83906B05-3E19-4B71-994A-2EBCB8792074", "vulnerable": true}, {"criteria": "cpe:2.3:a:rik_de_boer:revisioning:7.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "3AEFC2CF-4875-45FC-836A-A7B273CDAE1F", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The hook_node_access function in the revisioning module 7.x-1.x before 7.x-1.3 for Drupal checks the permissions of the current user even when it is called to check permissions of other users, which allows remote attackers to bypass intended access restrictions, as demonstrated when using the XML sitemap module to obtain sensitive information about unpublished content."}, {"lang": "es", "value": "La funcion hook_node_access en el m\u00f3dulo revisioning v7.x-1.x anterior a v7.x-1.3 para Drupal comprueba los permisos del usuario actual, incluso cuando se le llama para comprobar los permisos de otros usuarios, lo que permite a atacantes remotos evitar las restricciones de acceso, como se demuestra cuando se utiliza el m\u00f3dulo XML Sitemap para obtener informaci\u00f3n sensible acerca del contenido publicado."}], "id": "CVE-2012-1635", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-08-28T17:55:01.407", "references": [{"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://drupal.org/node/1407456"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "https://drupal.org/node/1409268"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://drupal.org/node/1407456"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "https://drupal.org/node/1409268"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}