Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2017-6929
PUBLISHED
More InfoOfficial Page
Assigner-drupal
Assigner Org ID-2c85b837-eb8b-40ed-9d74-228c62987387
View Known Exploited Vulnerability (KEV) details
Published At-01 Mar, 2018 | 22:00
Updated At-16 Sep, 2024 | 23:36
Rejected At-
▼CVE Numbering Authority (CNA)

A jQuery cross site scripting vulnerability is present when making Ajax requests to untrusted domains. This vulnerability is mitigated by the fact that it requires contributed or custom modules in order to exploit. For Drupal 8, this vulnerability was already fixed in Drupal 8.4.0 in the Drupal core upgrade to jQuery 3. For Drupal 7, it is fixed in the current release (Drupal 7.57) for jQuery 1.4.4 (the version that ships with Drupal 7 core) as well as for other newer versions of jQuery that might be used on the site, for example using the jQuery Update module.

Affected Products
Vendor
The Drupal AssociationDrupal.org
Product
Drupal Core
Versions
Affected
  • 7.x versions before 7.57
Problem Types
TypeCWE IDDescription
textN/ACross Site Scripting
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.debian.org/security/2018/dsa-4123
vendor-advisory
x_refsource_DEBIAN
https://lists.debian.org/debian-lts-announce/2018/02/msg00030.html
mailing-list
x_refsource_MLIST
https://www.drupal.org/sa-core-2018-001
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.debian.org/security/2018/dsa-4123
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://lists.debian.org/debian-lts-announce/2018/02/msg00030.html
mailing-list
x_refsource_MLIST
x_transferred
https://www.drupal.org/sa-core-2018-001
x_refsource_CONFIRM
x_transferred
Details not found