Show plain JSON{"id": "CVE-2014-9740", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2015-07-06T15:59:05.180", "references": [{"url": "http://www.securityfocus.com/bid/69447", "source": "cve@mitre.org"}, {"url": "https://www.drupal.org/node/2328549", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "https://www.drupal.org/node/2328567", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/69447", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.drupal.org/node/2328549", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.drupal.org/node/2328567", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Rules Link module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the \"administer rules links\" permission to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in the (1) question and (2) description strings in a confirmation form for a triggering Rules link."}, {"lang": "es", "value": "Vulnerabilidad de XSS en el m\u00f3dulo Rules Link 7.x-1.x anterior a 7.x-1.1 para Drupal permite a usuarios remotos autenticados con el permiso 'administrar rules links' inyectar secuencias de comandos web arbitrarios o HTML a trav\u00e9s de vectores no especificados, los cuales no est\u00e1n manejados correctamente en las cadenas (1) de preguntas y (2) descripciones en un formulario de confirmaci\u00f3n para una Rules link provocaci\u00f3n."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:*:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "3FB2D43F-B6EA-4B13-AB42-70A6DCCB5125"}, {"criteria": "cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta1:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "59B989E1-6878-43F1-8355-F4F8BE8EC5EA"}, {"criteria": "cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta2:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "71F36BF8-C7A3-4A9F-B9F2-F7FC8F809282"}, {"criteria": "cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta3:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "7633874F-3F01-419D-ACB2-24C318CC5C95"}, {"criteria": "cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta4:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "AEFABD2C-A38C-48DA-AE1D-A179B314857B"}, {"criteria": "cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta5:*:*:*:drupal:*:*", "vulnerable": true, "matchCriteriaId": "61FE7245-7698-4FAD-8B79-2B352947F952"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}