Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "matchCriteriaId": "37A224F5-AD67-44F8-BB77-214879E81429", "versionEndIncluding": "4.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "09A73149-677F-4112-95DF-04CFC94E46FE", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EBFF99BC-5E1D-4ADA-8BE7-07F7761C972C", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "AA805CAF-A678-43A9-932D-EE35DBCCA793", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "18331C39-0ACE-4651-9D9F-1533AAD7C58C", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "1BD40E38-71BA-42AD-BEBB-D4AD05ADDF6A", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "82317650-F136-446D-904D-354B4D26E91B", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "06A1ACAF-A468-43F0-9FAD-FA3D48363843", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A68656D9-3EA0-4749-AF1B-2F9B485A02ED", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "BFEDAA48-3F53-4B13-BB6A-CDC63E3922A5", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "F6946291-0F27-4666-95C8-E744800D3EFB", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "79713A65-5A3A-4682-8A49-614174AB7C6F", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:drupal:4.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "4E42FFA3-6FAE-4764-AF83-F544E6BA6CA7", "vulnerable": true}, {"criteria": "cpe:2.3:a:drupal:recipe_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A08F0C9-476D-41A1-9951-916AF53DB9AB", "versionEndIncluding": "1.53", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Recipe module (recipe.module) before 1.54 for Drupal 4.6 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo Recipe (recipe.module) anterior a 1.54 para Drupal 4.6 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de vectores no especificados."}], "evaluatorSolution": "If you do not use the Recipe Module, or use Recipe Module version 1.54 or later, you are not affected by this vulnerability.\r\nThis vulnerability has been addressed in the latest patch for:\r\nDrupal, Drupal, 4.6", "id": "CVE-2006-4120", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2006-08-14T23:04:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/77538"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/77753"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/21381"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/19422"}, {"source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3202"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28490"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/77538"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://drupal.org/node/77753"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/21381"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/19422"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3202"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28490"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}