| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.3 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in Drupal Print 6.x-1.2. Affected by this vulnerability is an unknown functionality. Such manipulation leads to an unknown weakness. This vulnerability is traded as CVE-2009-1037. There is no exploit available.
Details
A vulnerability, which was classified as problematic, has been found in Drupal Print 6.x-1.2 (Content Management System). Impacted is integrity. CVE summarizes:
Unspecified vulnerability in the Send by e-mail module in the "Printer, e-mail and PDF versions" module 5.x before 5.x-4.4 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to send unlimited spam messages via unknown vectors related to the flood control API.
The weakness was shared 03/20/2009 (Website). The advisory is available at drupal.org. This vulnerability is handled as CVE-2009-1037 since 03/20/2009. The exploitation is known to be easy. The attack may be launched remotely. No form of authentication is required for exploitation. The technical details are unknown and an exploit is not available.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at SecurityFocus (BID 34173†), OSVDB (52785†) and Secunia (SA34374†). The entry VDB-47255 is related to this item. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.drupal.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.3
VulDB Base Score: 5.3
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: UnknownCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
03/18/2009 🔍03/19/2009 🔍
03/19/2009 🔍
03/20/2009 🔍
03/20/2009 🔍
03/20/2009 🔍
03/17/2015 🔍
11/02/2018 🔍
Sources
Vendor: drupal.orgAdvisory: drupal.org
Status: Not defined
Confirmation: 🔍
CVE: CVE-2009-1037 (🔍)
GCVE (CVE): GCVE-0-2009-1037
GCVE (VulDB): GCVE-100-47234
SecurityFocus: 34173 - Drupal Printer, e-mail and PDF versions Module Flood Control API Open Email Relay Vulnerability
Secunia: 34374 - Drupal Print Module Security Bypass, Less Critical
OSVDB: 52785 - Send By E-mail Module for Drupal Flood Control API Security Bypass
See also: 🔍
Entry
Created: 03/17/2015 23:38Updated: 11/02/2018 08:31
Changes: 03/17/2015 23:38 (49), 11/02/2018 08:31 (8)
Complete: 🔍
Cache ID: 216:8FA:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.