GSD-2022-25278
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Under certain circumstances, the Drupal core form API evaluates form element access incorrectly. This may lead to a user being able to alter data they should not have access to. No forms provided by Drupal core are known to be vulnerable. However, forms added through contributed or custom modules or themes may be affected.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-25278",
"id": "GSD-2022-25278"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-25278"
],
"details": "Under certain circumstances, the Drupal core form API evaluates form element access incorrectly. This may lead to a user being able to alter data they should not have access to. No forms provided by Drupal core are known to be vulnerable. However, forms added through contributed or custom modules or themes may be affected.",
"id": "GSD-2022-25278",
"modified": "2023-12-13T01:19:26.453934Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@drupal.org",
"ID": "CVE-2022-25278",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Core",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "9.4",
"version_value": "9.4.3"
},
{
"version_affected": "\u003c",
"version_name": "9.3",
"version_value": "9.3.19"
}
]
}
}
]
},
"vendor_name": "Drupal"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Under certain circumstances, the Drupal core form API evaluates form element access incorrectly. This may lead to a user being able to alter data they should not have access to. No forms provided by Drupal core are known to be vulnerable. However, forms added through contributed or custom modules or themes may be affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Access Bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.drupal.org/sa-core-2022-013",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/sa-core-2022-013"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=8.0.0,\u003c9.3.19||\u003e=9.4.0,\u003c9.4.3",
"affected_versions": "All versions starting from 8.0.0 before 9.3.19, all versions starting from 9.4.0 before 9.4.3",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2023-05-09",
"description": "Drupal core form API evaluates form element access incorrectly. This can lead to a user being able to alter data they should not have access to.",
"fixed_versions": [
"9.3.19",
"9.4.3"
],
"identifier": "CVE-2022-25278",
"identifiers": [
"CVE-2022-25278",
"GHSA-cfh2-7f6h-3m85"
],
"not_impacted": "All versions before 8.0.0, all versions starting from 9.3.19 before 9.4.0, all versions starting from 9.4.3",
"package_slug": "packagist/drupal/core",
"pubdate": "2023-04-26",
"solution": "Upgrade to versions 9.3.19, 9.4.3 or above.",
"title": "Access bypass in Drupal Core",
"urls": [
"https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2022-25278.yaml",
"https://www.drupal.org/sa-core-2022-013",
"https://github.com/advisories/GHSA-cfh2-7f6h-3m85"
],
"uuid": "0711e1d0-642e-4b67-b953-00c30eacd8e9"
},
{
"affected_range": "\u003e=8.0.0,\u003c9.3.19||\u003e=9.4.0,\u003c9.4.3",
"affected_versions": "All versions starting from 8.0.0 before 9.3.19, all versions starting from 9.4.0 before 9.4.3",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-937",
"CWE-284"
],
"date": "2023-05-09",
"description": "Under certain circumstances, the Drupal core form API evaluates form element access incorrectly. This may lead to a user being able to alter data they should not have access to. No forms provided by Drupal core are known to be vulnerable. However, forms added through contributed or custom modules or themes may be affected.",
"fixed_versions": [
"9.3.19",
"9.4.3"
],
"identifier": "CVE-2022-25278",
"identifiers": [
"CVE-2022-25278"
],
"not_impacted": "All versions starting from 9.3.19 before 9.4.0, all versions starting from 9.4.3",
"package_slug": "packagist/drupal/drupal",
"pubdate": "2023-04-26",
"solution": "Upgrade to version 9.3.19, 9.4.3 or above.",
"title": "Improper Access Control",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-25278",
"https://www.drupal.org/sa-core-2022-013"
],
"uuid": "538fe53a-163d-47a4-babe-7d87947b06fa"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.4.3",
"versionStartIncluding": "9.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "9.3.19",
"versionStartIncluding": "8.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@drupal.org",
"ID": "CVE-2022-25278"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Under certain circumstances, the Drupal core form API evaluates form element access incorrectly. This may lead to a user being able to alter data they should not have access to. No forms provided by Drupal core are known to be vulnerable. However, forms added through contributed or custom modules or themes may be affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.drupal.org/sa-core-2022-013",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.drupal.org/sa-core-2022-013"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-05-09T01:38Z",
"publishedDate": "2023-04-26T15:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…