CVE-2014-8078
Published Oct 9, 2014
Last updated 7 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the Print (aka Printer, e-mail and PDF versions) module 6.x-1.x before 6.x-1.19, 7.x-1.x before 7.x-1.3, and 7.x-2.x before 7.x-2.0 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to nodes.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:drupal:print:6.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82398A3C-DB58-42DE-BC16-56D92FAB55B6" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33406F84-81BF-492E-9C22-171311E519A1" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BB084C5-BE56-4128-8A5D-8F536B276A14" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F6B609E-4AD4-46CD-B9C7-5D0690B83326" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EFCA9EB-0A08-4FC2-BF40-DA3BD154DEAE" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8244420-574B-48C0-A714-F122A0788170" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDF8C976-F554-4F60-90D0-E5FF38CC0BCD" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C48EF4F-7ED8-4962-B0F6-16B14A707EDE" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC1A56B2-5238-428F-93DE-263335E6BE6C" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA275911-894A-4CFD-8ED4-40FC30F46408" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D246ABB-C6FD-4EA0-9977-D8B0F0D2564E" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.11:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3809C903-AA1F-4BC2-A1FF-65937F16153A" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4379147-EE72-4676-BA72-57B82679DB06" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DFCF73D-6AE2-47C3-B8CB-24C05F7FA2FB" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60344875-5677-4B32-A014-DE81D0B293BD" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "597EF53A-CCC7-4514-84BF-88F37D469A50" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6BC4957-D19F-4835-8DC1-6F8979CFA736" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A819B30-3322-4977-B5A2-944C1264D9D2" }, { "criteria": "cpe:2.3:a:drupal:print:6.x-1.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E077002D-7B82-4D9F-B168-753B55C37B17" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB340CE8-813C-4C56-A6A9-C141C25A342F" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4A5A8C6-05B8-48BE-8D39-9FC020F25C76" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EF204D4-01D7-4BAD-9F9E-02B46EC83677" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F426F2DF-B3F3-46BD-BD8C-476C92E9FC55" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "831F6893-FB49-4D61-8991-C4BA43A851F0" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F3C9EB4-3BBE-48B4-BEC0-15FD8ADBBE2A" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A7DFC10-641B-4AC2-B07A-92D47BBF0D4C" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-1.x-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32D05D66-A4D1-417F-89CF-474B3251281A" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-2.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1285F499-7C26-4BA4-9FD2-7F03B84D4A99" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-2.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2ADF0914-D471-4335-9FC5-58B62FDA5AED" }, { "criteria": "cpe:2.3:a:drupal:print:7.x-2.x-dev:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98A5AA7F-AF17-438F-B280-F8C5CFCF5729" } ], "operator": "OR" } ] } ]