{"api_version":"1","generated_at":"2026-05-06T05:25:16+00:00","cve":"CVE-2014-9740","urls":{"html":"https://cve.report/CVE-2014-9740","api":"https://cve.report/api/cve/CVE-2014-9740.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2014-9740","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2014-9740"},"summary":{"title":"CVE-2014-9740","description":"Cross-site scripting (XSS) vulnerability in the Rules Link module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the \"administer rules links\" permission to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in the (1) question and (2) description strings in a confirmation form for a triggering Rules link.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2015-07-06 15:59:00","updated_at":"2015-07-08 14:46:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://www.drupal.org/node/2328567","name":"https://www.drupal.org/node/2328567","refsource":"MISC","tags":["Patch","Vendor Advisory"],"title":"SA-CONTRIB-2014-083 - Rules Link - Cross Site Scripting (XSS) | Drupal.org","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.drupal.org/node/2328549","name":"https://www.drupal.org/node/2328549","refsource":"CONFIRM","tags":["Patch"],"title":"rules_link 7.x-1.1 | Drupal.org","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/69447","name":"69447","refsource":"BID","tags":[],"title":"Drupal RedHen Rules Link Module Cross Site Scripting Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2014-9740","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9740","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta4","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"},{"cve_year":"2014","cve_id":"9740","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rules_link_project","cpe5":"rules_link","cpe6":"7.x-1.0","cpe7":"beta5","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"drupal","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2014-9740","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting (XSS) vulnerability in the Rules Link module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the \"administer rules links\" permission to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in the (1) question and (2) description strings in a confirmation form for a triggering Rules link."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://www.drupal.org/node/2328567","refsource":"MISC","url":"https://www.drupal.org/node/2328567"},{"name":"https://www.drupal.org/node/2328549","refsource":"CONFIRM","url":"https://www.drupal.org/node/2328549"},{"name":"69447","refsource":"BID","url":"http://www.securityfocus.com/bid/69447"}]}},"nvd":{"publishedDate":"2015-07-06 15:59:00","lastModifiedDate":"2015-07-08 14:46:00","problem_types":["CWE-79"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta3:*:*:*:drupal:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta4:*:*:*:drupal:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta2:*:*:*:drupal:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta1:*:*:*:drupal:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:*:*:*:*:drupal:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rules_link_project:rules_link:7.x-1.0:beta5:*:*:*:drupal:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2014","CveId":"9740","Ordinal":"82364","Title":"CVE-2014-9740","CVE":"CVE-2014-9740","Year":"2014"},"notes":[{"CveYear":"2014","CveId":"9740","Ordinal":"1","NoteData":"Cross-site scripting (XSS) vulnerability in the Rules Link module 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the \"administer rules links\" permission to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in the (1) question and (2) description strings in a confirmation form for a triggering Rules link.","Type":"Description","Title":null},{"CveYear":"2014","CveId":"9740","Ordinal":"2","NoteData":"2015-07-06","Type":"Other","Title":"Published"}]}}}