CVE-2014-9025CVE-2014-9025

Affected configuration(s):

cpe:/a:commerceguys:commerce:7.x-1.0::~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:alpha1:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:alpha2:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:alpha3:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:alpha4:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:alpha5:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:beta1:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:beta2:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:beta3:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:beta4:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:rc1:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:rc2:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.0:rc3:~~~drupal~~
cpe:/a:commerceguys:commerce:7.x-1.1::~~~drupal~~

Date published: 2014-11-20T12:50:14.457-05:00

Date last modified: 2014-11-21T08:02:31.670-05:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: https://www.drupal.org/node/2336327

Summary: The default checkout completion rule in the commerce_order module in the Drupal Commerce module 7.x-1.x before 7.x-1.10 for Drupal uses the email address as the username for new accounts created at checkout, which allows remote attackers to obtain sensitive information via unspecified vectors.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.