logo

CVE-2023-5256 drupal/core

Package

Manager: composer
Name: drupal/core
Vulnerable Version: >=8.7.0 <9.5.11 || >=10.0.0 <10.0.11 || >=10.1.0 <10.1.4

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00821 pctl0.7354

Details

Cache poisoning in drupal/core In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation. This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API. The core REST and contributed GraphQL modules are not affected.

Metadata

Created: 2023-09-28T21:30:58Z
Modified: 2023-12-20T21:01:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-rjqg-3h9m-fx5x/GHSA-rjqg-3h9m-fx5x.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-rjqg-3h9m-fx5x
Finding: F308
Auto approve: 1