{ "schema_version": "1.4.0", "id": "GHSA-g8m8-5prf-39x3", "modified": "2022-05-01T18:17:24Z", "published": "2022-05-01T18:17:24Z", "aliases": [ "CVE-2007-3817" ], "details": "Cross-site scripting (XSS) vulnerability in the LoginToboggan module 4.7.x-1.0, 4.7.x-1.x-dev, and 5.x-1.x-dev before 20070712 for Drupal, when configured to display a \"Log out\" link, allows remote attackers to inject arbitrary web script or HTML via a crafted username. NOTE: Drupal sanitizes the username by removing certain characters, so this might not be a vulnerability on default installations.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3817" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35387" }, { "type": "WEB", "url": "http://drupal.org/node/158921" }, { "type": "WEB", "url": "http://osvdb.org/36343" }, { "type": "WEB", "url": "http://secunia.com/advisories/26028" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/24901" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/2526" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-07-17T01:30:00Z" } }