Vulnerability from drupal
The Apigee Edge module allows connecting a Drupal site to Apigee Edge in order to build a developer portal. It contains an "Apigee Edge Teams" submodule that provides shared app functionality by allowing developers to be organized into teams.
The "Apigee Edge Teams" submodule has an information disclosure vulnerability. The "Add team member" form displays an email autocomplete field which can expose the email addresses of other accounts in the system.
This vulnerability is mitigated by the fact that to have access to the form, the site must have the Apigee Edge Teams submodule enabled, and the user must have a team role that has the "Manage team members" permission. (Note that team roles and permissions are not related to Drupal core roles and permissions).
{
"affected": [
{
"database_specific": {
"affected_versions": "\u003c1.12.0"
},
"package": {
"ecosystem": "Packagist:https://packages.drupal.org/8",
"name": "drupal/apigee_edge"
},
"ranges": [
{
"database_specific": {
"constraint": "\u003c1.12.0"
},
"events": [
{
"introduced": "0"
},
{
"fixed": "1.12.0"
}
],
"type": "ECOSYSTEM"
}
],
"severity": []
}
],
"aliases": [],
"credits": [
{
"contact": [
"https://www.drupal.org/user/1055344"
],
"name": "Arlina Espinoza Rhoton"
}
],
"details": "The Apigee Edge module allows connecting a Drupal site to Apigee Edge in order to build a developer portal. It contains an \"Apigee Edge Teams\" submodule that provides shared app functionality by allowing developers to be organized into teams.\n\nThe \"Apigee Edge Teams\" submodule has an information disclosure vulnerability. The \"Add team member\" form displays an email autocomplete field which can expose the email addresses of other accounts in the system.\n\nThis vulnerability is mitigated by the fact that to have access to the form, the site must have the Apigee Edge Teams submodule enabled, and the user must have a team role that has the \"Manage team members\" permission. (Note that team roles and permissions are not related to Drupal core roles and permissions).",
"id": "DRUPAL-CONTRIB-2020-028",
"modified": "2023-08-11T17:49:38.000Z",
"published": "2020-07-22T18:48:10.000Z",
"references": [
{
"type": "WEB",
"url": "https://www.drupal.org/sa-contrib-2020-028"
}
],
"schema_version": "1.7.0"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.