{ "id": "CVE-2009-3648", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-09T14:30:00.420", "lastModified": "2017-08-17T01:31:13.477", "vulnStatus": "Modified", "evaluatorSolution": "Per: http://www.madirish.net/?article=251\r\n\r\n\r\nPatch\r\n\r\nApplying the following patch mitigates these threats.\r\n\r\n--- service_links/service_links.module\t2008-02-26 12:01:27.000000000 -0500\r\n+++ service_links/service_links.module\t2009-10-02 06:33:21.000000000 -0400\r\n@@ -35,11 +35,12 @@ function service_links_admin_settings() \r\n '#title' => t('Where to show the service links'),\r\n '#description' => t('Set the node types and categories you want to display links for.'),\r\n );\r\n+ $names = array_map('filter_xss', node_get_types('names'));\r\n $form['where_to_show_the_links']['service_links_node_types'] = array(\r\n '#type' => 'checkboxes',\r\n '#title' => t('Node types'),\r\n '#default_value' => variable_get('service_links_node_types', array()),\r\n- '#options' => node_get_types('names'),\r\n+ '#options' => $names,\r\n );\r\n if (module_exists('taxonomy')) {\r\n $form['where_to_show_the_links']['service_links_category_types'] = array(\r\n", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Service Links 6.x-1.0, a module for Drupal, allows remote authenticated users, with 'administer content types' permissions, to inject arbitrary web script or HTML via unspecified vectors when displaying content type names." }, { "lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo de Drupal \"Service Links\" v6.x-1.0, permite inyectar HTML o scripts we aleatorios a usuarios remotos autenticados, con permisos para \"administrar tipos de contenido \", a trav\u00e9s de vectores no especificados cuando se muestran los nombres de tipo de contenido." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 3.5 }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:apsivam:service_links:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DF61CB4-6946-493A-AB36-BF7DBBBE08BF" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54" } ] } ] } ], "references": [ { "url": "http://www.madirish.net/?article=251", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ] }, { "url": "http://www.securityfocus.com/bid/36584", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53633", "source": "cve@mitre.org" } ] }