Логотип exploitDog
product: "drupal"
Консоль
Логотип exploitDog

exploitDog

product: "drupal"
Drupal

Drupalсистема управления контентом с открытым исходным кодом. На Drupal работает более миллиона сайтов — от личных блогов до сайтов компаний, политических партий и государственных организаций.

Релизный цикл, информация об уязвимостях

Продукт: Drupal
Вендор: drupal

График релизов

10.311.011.110.411.210.52024202520262027

Недавние уязвимости Drupal

Количество 1 988

debian логотип

CVE-2022-25273

больше 2 лет назад

Drupal core's form API has a vulnerability where certain contributed o ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-25274

больше 2 лет назад

Drupal 9.3 implemented a generic entity access API for entity revisions. However, this API was not completely integrated with existing permissions, resulting in some possible access bypass for users who have access to use revisions of content generally, but who do not have access to individual items of node and media content. This vulnerability only affects sites using Drupal's revision system.

CVSS3: 5.4
EPSS: Низкий
ubuntu логотип

CVE-2022-25273

больше 2 лет назад

Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-25275

больше 2 лет назад

In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system. Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability. This vulnerability is mitigated by the fact that it only applies when the site sets (Drupal 9) $config['image.settings']['allow_insecure_derivatives'] or (Drupal 7) $conf['image_allow_insecure_derivatives'] to TRUE. The recommended and default setting is FALSE, and Drupal core does not provide a way to change that in the admin UI. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing files or image styles after updating.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-cfh2-7f6h-3m85

больше 2 лет назад

Access bypass in Drupal Core

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-52m2-vc4m-jj33

около 3 лет назад

Twig may load a template outside a configured directory when using the filesystem loader

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-39261

около 3 лет назад

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-39261

около 3 лет назад

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-39261

около 3 лет назад

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-6955-67hm-vjjq

больше 3 лет назад

Drupal core arbitrary PHP code execution

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
debian логотип
CVE-2022-25273

Drupal core's form API has a vulnerability where certain contributed o ...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-25274

Drupal 9.3 implemented a generic entity access API for entity revisions. However, this API was not completely integrated with existing permissions, resulting in some possible access bypass for users who have access to use revisions of content generally, but who do not have access to individual items of node and media content. This vulnerability only affects sites using Drupal's revision system.

CVSS3: 5.4
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-25273

Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-25275

In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system. Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability. This vulnerability is mitigated by the fact that it only applies when the site sets (Drupal 9) $config['image.settings']['allow_insecure_derivatives'] or (Drupal 7) $conf['image_allow_insecure_derivatives'] to TRUE. The recommended and default setting is FALSE, and Drupal core does not provide a way to change that in the admin UI. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing files or image styles after updating.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-cfh2-7f6h-3m85

Access bypass in Drupal Core

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-52m2-vc4m-jj33

Twig may load a template outside a configured directory when using the filesystem loader

CVSS3: 7.5
2%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-39261

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

CVSS3: 7.5
2%
Низкий
около 3 лет назад
debian логотип
CVE-2022-39261

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x ...

CVSS3: 7.5
2%
Низкий
около 3 лет назад
ubuntu логотип
CVE-2022-39261

Twig is a template language for PHP. Versions 1.x prior to 1.44.7, 2.x prior to 2.15.3, and 3.x prior to 3.4.3 encounter an issue when the filesystem loader loads templates for which the name is a user input. It is possible to use the `source` or `include` statement to read arbitrary files from outside the templates' directory when using a namespace like `@somewhere/../some.file`. In such a case, validation is bypassed. Versions 1.44.7, 2.15.3, and 3.4.3 contain a fix for validation of such template names. There are no known workarounds aside from upgrading.

CVSS3: 7.5
2%
Низкий
около 3 лет назад
github логотип
GHSA-6955-67hm-vjjq

Drupal core arbitrary PHP code execution

CVSS3: 7.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться