Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2022-25275 CVE-2022-25276 CVE-2022-25277 CVE-2022-25278 |
CWE-ID | CWE-200 CWE-79 CWE-94 CWE-284 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Drupal Web applications / CMS |
Vendor | Drupal |
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU65633
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-25275
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the Image module. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsDrupal: 7.0 - 7.x-dev, 9.3.0 - 9.3.18, 9.4.0 - 9.4.2, 9.2.0 - 9.2.21, 9.1.0 - 9.1.15, 9.0.0 - 9.0.14
http://www.drupal.org/sa-core-2022-012
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU65636
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-25276
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to the Media oEmbed iframe route does not properly validate the iframe domain setting. A remote user can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsDrupal: 9.3.0 - 9.3.18, 9.4.0 - 9.4.2, 9.2.0 - 9.2.21, 9.1.0 - 9.1.15, 9.0.0 - 9.0.14
http://www.drupal.org/sa-core-2022-015
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU65635
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-25277
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to improper sanitization of certain filenames on uploaded files with an "htaccess" extension. A remote administrator can execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsDrupal: 9.3.0 - 9.3.18, 9.4.0 - 9.4.2, 9.2.0 - 9.2.21, 9.1.0 - 9.1.15, 9.0.0 - 9.0.14
http://www.drupal.org/sa-core-2022-014
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU65634
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-25278
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and alter data they should not have access to.
MitigationInstall updates from vendor's website.
Vulnerable software versionsDrupal: 9.3.0 - 9.3.18, 9.4.0 - 9.4.2, 9.2.0 - 9.2.21, 9.1.0 - 9.1.15, 9.0.0 - 9.0.14
http://www.drupal.org/sa-core-2022-013
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?