Vulnerability from drupal
Published
2021-08-25 14:36
Modified
2023-08-11 16:59
Summary
Details
The Admin Toolbar (admin_toolbar) module extends the default toolbar provided by Drupal Core with various features facilitating day-to-day editorial and administrative work.
The Admin Toolbar Search sub-module of this module
- doesn't sanitize user input in certain cases, which leads to a Cross-Site-Scripting (XSS) vulnerability. An attacker that can create or edit certain entities, entity bundles or entity types may be able to exploit one or more Cross-Site-Scripting (XSS) vulnerabilities to target users with access to the Admin Toolbar Search search box, including site admins with privileged access.
- doesn't properly check access in certain cases, which may result in an information disclosure vulnerability of entity type and bundle labels.
The vulnerability is mitigated by the facts, that:
- the Admin Toolbar Search sub-module must be enabled.
- an attacker must have one of several permissions, of which at least some are commonly only assigned to either editors, site builders or administrators.
- a targeted account must have permission to use the search box provided by the Admin Toolbar Search sub-module.
Credits
Patrick Fey
www.drupal.org/user/998680
{
"affected": [
{
"database_specific": {
"affected_versions": "\u003c2.5.0 || 3.0.0 || 3.0.1"
},
"package": {
"ecosystem": "Packagist:https://packages.drupal.org/8",
"name": "drupal/admin_toolbar"
},
"ranges": [
{
"database_specific": {
"constraint": "\u003c2.5.0"
},
"events": [
{
"introduced": "0"
},
{
"fixed": "2.5.0"
}
],
"type": "ECOSYSTEM"
},
{
"database_specific": {
"constraint": "3.0.0"
},
"events": [
{
"introduced": "3.0.0"
},
{
"last_affected": "3.0.0"
}
],
"type": "ECOSYSTEM"
},
{
"database_specific": {
"constraint": "3.0.1"
},
"events": [
{
"introduced": "3.0.1"
},
{
"last_affected": "3.0.1"
}
],
"type": "ECOSYSTEM"
}
],
"severity": []
}
],
"aliases": [],
"credits": [
{
"contact": [
"https://www.drupal.org/user/998680"
],
"name": "Patrick Fey"
}
],
"details": "The *Admin Toolbar* (`admin_toolbar`) module extends the default toolbar provided by Drupal Core with various features facilitating day-to-day editorial and administrative work.\n\nThe *Admin Toolbar Search* sub-module of this module\n\n* doesn\u0027t sanitize user input in certain cases, which leads to a Cross-Site-Scripting (XSS) vulnerability. An attacker that can create or edit certain entities, entity bundles or entity types may be able to exploit one or more Cross-Site-Scripting (XSS) vulnerabilities to target users with access to the *Admin Toolbar Search* search box, including site admins with privileged access.\n* doesn\u0027t properly check access in certain cases, which may result in an information disclosure vulnerability of entity type and bundle labels.\n\nThe vulnerability is mitigated by the facts, that:\n\n* the *Admin Toolbar Search* sub-module must be enabled.\n* an attacker must have one of several permissions, of which at least some are commonly only assigned to either editors, site builders or administrators.\n* a targeted account must have permission to use the search box provided by the *Admin Toolbar Search* sub-module.",
"id": "DRUPAL-CONTRIB-2021-025",
"modified": "2023-08-11T16:59:37.000Z",
"published": "2021-08-25T14:36:25.000Z",
"references": [
{
"type": "WEB",
"url": "https://www.drupal.org/sa-contrib-2021-025"
}
],
"schema_version": "1.7.0"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…