{ "id": "CVE-2009-1344", "sourceIdentifier": "cve@mitre.org", "published": "2009-04-20T14:30:00.483", "lastModified": "2009-04-20T14:30:00.483", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Localization client module 5.x before 5.x-1.2 and 6.x before 6.x-1.7, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via input to the translation functionality." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el modulo \"Localization client\" en versiones 5.x anteriores a 5.x-1.2 y 6.x anteriores a 6.x-1.7 del gestor de contenidos Drupal. Permite a usuarios remotos inyectar codigo de script web o c\u00f3digo HTML a trav\u00e9s de la entrada a la funcionalidad de traducci\u00f3n." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:5.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3E569CF-2F12-434C-9335-F1D863B95C5A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:5.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "79CEEDA8-74C8-4172-8142-BAB017B2B6DB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:5.x-1.xdev:*:*:*:*:*:*:*", "matchCriteriaId": "1426782B-F79F-409E-A855-413C9C780FC1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:6.x-1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6A4EE4E-EA90-4E6C-92F9-3A54405593A3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:6.x-1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F6DDC58-2B86-426A-8581-BED2D853A83C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:6.x-1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8A17AEEF-A5F9-48A6-B95F-FA3396BAD2BB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:6.x-1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4060FDC-1BAE-4A9F-9123-BF37365F1258" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:6.x-1.4:*:*:*:*:*:*:*", "matchCriteriaId": "1B36A0D0-1A87-487A-80CD-87E21F57C056" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:6.x-1.5:*:*:*:*:*:*:*", "matchCriteriaId": "56E9C3FB-F440-44B6-AB1E-9EAD59EF7E32" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:6.x-1.6:*:*:*:*:*:*:*", "matchCriteriaId": "C189416E-1B0D-4C4C-9F1D-FF8C5B95ADD9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:drupal:localization_client:6.x-1.xdev:*:*:*:*:*:*:*", "matchCriteriaId": "057E6EE9-EEAC-4DB2-BC61-17D66590AC9C" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "799CA80B-F3FA-4183-A791-2071A7DA1E54" } ] } ] } ], "references": [ { "url": "http://drupal.org/node/434682", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/34546", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://www.vupen.com/english/advisories/2009/1060", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] } ] }