GSD-2022-25276
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-25276",
"id": "GSD-2022-25276"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-25276"
],
"details": "The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities.",
"id": "GSD-2022-25276",
"modified": "2023-12-13T01:19:26.503427Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@drupal.org",
"ID": "CVE-2022-25276",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Core",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "9.4",
"version_value": "9.4.3"
},
{
"version_affected": "\u003c",
"version_name": "9.3",
"version_value": "9.3.19"
}
]
}
}
]
},
"vendor_name": "Drupal"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": " Multiple vulnerabilities"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.drupal.org/sa-core-2022-015",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/sa-core-2022-015"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=8.0.0,\u003c9.3.19||\u003e=9.4.0,\u003c9.4.3",
"affected_versions": "All versions starting from 8.0.0 before 9.3.19, all versions starting from 9.4.0 before 9.4.3",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-79",
"CWE-937"
],
"date": "2023-05-05",
"description": "The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities.",
"fixed_versions": [
"9.3.19",
"9.4.3"
],
"identifier": "CVE-2022-25276",
"identifiers": [
"CVE-2022-25276",
"GHSA-4wfq-jc9h-vpcx"
],
"not_impacted": "All versions before 8.0.0, all versions starting from 9.3.19 before 9.4.0, all versions starting from 9.4.3",
"package_slug": "packagist/drupal/core",
"pubdate": "2023-04-26",
"solution": "Upgrade to versions 9.3.19, 9.4.3 or above.",
"title": "Lack of domain validation in Druple core",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-25276",
"https://www.drupal.org/sa-core-2022-015",
"https://github.com/advisories/GHSA-4wfq-jc9h-vpcx"
],
"uuid": "fa7bcfe9-eb6a-47ed-a846-3f87f7cc3775"
},
{
"affected_range": "\u003e=8.0.0 \u003c9.3.19 || \u003e=9.4.0 \u003c9.4.3",
"affected_versions": "All versions starting from 8.0.0 before 9.3.19, all versions starting from 9.4.0 before 9.4.3",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-79",
"CWE-937"
],
"date": "2023-05-05",
"description": "The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities.",
"fixed_versions": [
"9.3.19",
"9.4.3"
],
"identifier": "CVE-2022-25276",
"identifiers": [
"CVE-2022-25276"
],
"not_impacted": "All versions before 8.0.0, all versions starting from 9.3.19 before 9.4.0, all versions starting from 9.4.3",
"package_slug": "packagist/drupal/drupal",
"pubdate": "2023-04-26",
"solution": "Upgrade to version 9.3.19, 9.4.3 or above.",
"title": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-25276",
"https://www.drupal.org/sa-core-2022-015"
],
"uuid": "efd09805-c46a-469e-a097-022e50ff7ba7"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.4.3",
"versionStartIncluding": "9.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.3.19",
"versionStartIncluding": "9.3.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@drupal.org",
"ID": "CVE-2022-25276"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.drupal.org/sa-core-2022-015",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.drupal.org/sa-core-2022-015"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2023-05-05T19:26Z",
"publishedDate": "2023-04-26T15:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…