Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CONTRIB-2014-083
HistoryAug 27, 2014 - 12:00 a.m.

SA-CONTRIB-2014-083 - Rules Link - Cross Site Scripting (XSS)

2014-08-2700:00:00
Drupal Security Team
www.drupal.org
3

2.1 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

36.6%

This module allows you to create links which trigger arbitrary functionality with the help of the Rules module.

The module doesn’t sufficiently sanitize the question and description strings when confirmation forms are displayed for triggering Rules links.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer rules links”.

CVE identifier(s) issued

  • CVE-2014-9740

Versions affected

  • Rules Link 7.x-1.x versions prior to 7.x-1.1.

Drupal core is not affected. If you do not use the contributed Rules Link module,
there is nothing you need to do.

Solution

Install the latest version:

  • If you use the Rules Link module for Drupal 7.x, upgrade to Rules Link 7.x-1.1

Also see the Rules Link project page.

Reported by

Fixed by

Coordinated by

2.1 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:S/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

36.6%

Related for DRUPAL-SA-CONTRIB-2014-083