Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:fourkitchens:block_class:5.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E6FC3B5-64D3-482E-B28F-75D8A73D17EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:5.x-1.0:rc:*:*:*:*:*:*", "matchCriteriaId": "554F8AE2-1404-44BA-971F-B140DE95F836", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:5.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBA36D57-9BF9-48DE-BED2-69F19455111D", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:5.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "93B17A40-C151-4DA2-8ED0-BFFD80137102", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5C3EAC09-AD61-4BEC-8AA6-0190BCE08C19", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8FDD5A5-5957-4373-9900-BA5FAF71EEC9", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "82DB54D3-EC4C-4D03-AEC7-4C6308CEFC9D", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "7C96BABD-0873-4C62-9AC7-B01355FBB76D", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "A56CF89B-8718-4970-ABDF-0E7E59A298B7", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:6.x-1.4:beta1:*:*:*:*:*:*", "matchCriteriaId": "865810AE-640A-4EAE-91FD-27D8C517C26C", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:6.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "EE0149B5-DAF8-4F1A-8B64-9879C3978B1C", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:6.x-2.x:dev:*:*:*:*:*:*", "matchCriteriaId": "9A802E1B-0DE0-4BA6-A91A-75AC29F49F0D", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:7.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "24F35555-BC92-4475-AA05-7D6E06B6614B", "vulnerable": true}, {"criteria": "cpe:2.3:a:fourkitchens:block_class:7.x-1.x:dev:*:*:*:*:*:*", "matchCriteriaId": "1715D2CB-6246-44FD-84B7-D84D1AD07D2B", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B1170D-AD33-4C7A-892D-63AC71B032CF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in block_class.module in the Block Class module before 7.x-1.1 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via the class name."}, {"lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en block_class.module en el m\u00f3dulo Block Class antes de v7.x-1.1 para Drupal, permite a usuarios autenticados remotamente, con algunos permisos, inyectar secuencias de comandos web o HTML a trav\u00e9s del nombre de clase."}], "id": "CVE-2012-1657", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2012-09-18T20:55:01.880", "references": [{"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://drupal.org/node/1471090"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/1471808"}, {"source": "secalert@redhat.com", "url": "http://drupalcode.org/project/block_class.git/commit/9a5205d"}, {"source": "secalert@redhat.com", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/48298"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1"}, {"source": "secalert@redhat.com", "url": "http://www.osvdb.org/79851"}, {"source": "secalert@redhat.com", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/52341"}, {"source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73776"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://drupal.org/node/1471090"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/1471808"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://drupalcode.org/project/block_class.git/commit/9a5205d"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/48298"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/07/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/79851"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/52341"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73776"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}