Vulnerability Details : CVE-2014-8745
Cross-site scripting (XSS) vulnerability in the Custom Search module 6.x-1.x before 6.x-1.13 and 7.x-1.x before 7.x-1.15 for Drupal allows remote authenticated users with the "administer taxonomy" permission to inject arbitrary web script or HTML via a taxonomy vocabulary label.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2014-8745
Probability of exploitation activity in the next 30 days: 0.11%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 44 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-8745
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST |
CWE ids for CVE-2014-8745
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-8745
-
http://drupal.org/node/2248077
SA-CONTRIB-2014-043 - Custom Search - Cross Site Scripting (XSS) | Drupal.org
-
http://www.securityfocus.com/bid/67062
Drupal Custom Search Module Taxonomy Vocabulary Labels HTML Injection Vulnerability
-
https://www.drupal.org/node/2247921
Access to this page has been denied.Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/92754
Custom Search Module for Drupal taxonomy vocabulary cross-site scripting CVE-2014-8745 Vulnerability Report
-
https://www.drupal.org/node/2247919
Access to this page has been denied.Patch
Products affected by CVE-2014-8745
- cpe:2.3:a:drupal:custom_search_module:6.x-1.11:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.10:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.9:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.8:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.8:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.7:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.6:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.5:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.7:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.5:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.12:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.10:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.3:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.1:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.3:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.2:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.1:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.0:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.13:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.0:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.6:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.4:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.11:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.9:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.4:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.2:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:6.x-1.12:*:*:*:*:*:*:*
- cpe:2.3:a:drupal:custom_search_module:7.x-1.14:*:*:*:*:*:*:*