CVE-2014-8765

Multiple cross-site scripting (XSS) vulnerabilities in the Project Issue File Review module (PIFR) module 6.x-2.x before 6.x-2.17 for Drupal allow (1) remote attackers to inject arbitrary web script or HTML via a crafted patch, which triggers a PIFR client to test the patch and return the results to the PIFR_Server test results page or (2) remote authenticated users with the "manage PIFR environments" permission to inject arbitrary web script or HTML via vectors involving a PIFR_Server administrative page.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:drupal:project_issue_file_review:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.00:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.01:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.02:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.03:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.04:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.05:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.06:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.07:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.08:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.08:rc1:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.08:rc2:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.08:rc3:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.08:rc4:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.10:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.12:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.12:alpha1:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.12:rc1:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.13:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.14:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.14:beta1:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.14:beta2:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.14:beta3:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.14:beta4:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.14:beta5:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.15:*:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.15:rc1:*:*:*:*:*:*
cpe:2.3:a:drupal:project_issue_file_review:6.x-2.15:rc2:*:*:*:*:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () http://secunia.com/advisories/57030 - () http://secunia.com/advisories/57030 -
References () http://www.securityfocus.com/bid/65830 - () http://www.securityfocus.com/bid/65830 -
References () https://www.drupal.org/node/2205755 - Patch () https://www.drupal.org/node/2205755 - Patch
References () https://www.drupal.org/node/2205767 - Vendor Advisory () https://www.drupal.org/node/2205767 - Vendor Advisory

Information

Published : 2014-10-14 14:55

Updated : 2024-11-21 02:19


NVD link : CVE-2014-8765

Mitre link : CVE-2014-8765

CVE.ORG link : CVE-2014-8765


JSON object : View

Products Affected

drupal

  • project_issue_file_review
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')