Vulnerability from drupal
Published
2017-11-08 17:22
Modified
2023-08-21 13:31
Summary
Details
Custom Permissions is a lightweight module that allows permissions to be created and managed through an administrative form.
When this module is in use, any user who is able to perform an action which rebuilds some of Drupal's caches can trigger a scenario in which certain pages protected by this module's custom permissions temporarily lose those custom access controls, thereby leading to an access bypass vulnerability.
Credits
David Rothstein
www.drupal.org/user/124982
Michael Koza
www.drupal.org/user/2110062
{
"affected": [
{
"database_specific": {
"affected_versions": "\u003c1.1.0"
},
"package": {
"ecosystem": "Packagist:https://packages.drupal.org/8",
"name": "drupal/config_perms"
},
"ranges": [
{
"database_specific": {
"constraint": "\u003c1.1.0"
},
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.0"
}
],
"type": "ECOSYSTEM"
}
],
"severity": []
}
],
"aliases": [],
"credits": [
{
"contact": [
"https://www.drupal.org/user/124982"
],
"name": "David Rothstein"
},
{
"contact": [
"https://www.drupal.org/user/2110062"
],
"name": "Michael Koza"
}
],
"details": "Custom Permissions is a lightweight module that allows permissions to be created and managed through an administrative form.\n\nWhen this module is in use, any user who is able to perform an action which rebuilds some of Drupal\u0027s caches can trigger a scenario in which certain pages protected by this module\u0027s custom permissions temporarily lose those custom access controls, thereby leading to an access bypass vulnerability.",
"id": "DRUPAL-CONTRIB-2017-083",
"modified": "2023-08-21T13:31:18.000Z",
"published": "2017-11-08T17:22:08.000Z",
"references": [
{
"type": "WEB",
"url": "https://www.drupal.org/sa-contrib-2017-083"
}
],
"schema_version": "1.7.0"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…