Vulnerability from drupal
Published
2022-06-29 17:25
Modified
2023-08-10 21:35
Summary
Details
This module enables you to create and manage a version of taxonomy based on configuration entities instead of content. This allows the terms, vocabularies, and their structure to be exported, imported, and managed as site configuration.
The module doesn't sufficiently check access for the edit and delete operations. Users with "access content" permission can edit or delete any term. The edit form may expose term data that users could not otherwise see, since there is no term view route by default.
This vulnerability is slightly mitigated by the fact that an attacker must have a role with the permission "access content", so may not be accessible to anonymous users on all sites.
Credits
Emil Johnsson
www.drupal.org/user/1868992
{
"affected": [
{
"database_specific": {
"affected_versions": "\u003c1.6.0",
"patched": true
},
"package": {
"ecosystem": "Packagist:https://packages.drupal.org/8",
"name": "drupal/config_terms"
},
"ranges": [
{
"database_specific": {
"constraint": "\u003c1.6.0"
},
"events": [
{
"introduced": "0"
},
{
"fixed": "1.6.0"
}
],
"type": "ECOSYSTEM"
}
],
"severity": []
}
],
"aliases": [],
"credits": [
{
"contact": [
"https://www.drupal.org/user/1868992"
],
"name": "Emil Johnsson"
}
],
"details": "This module enables you to create and manage a version of taxonomy based on configuration entities instead of content. This allows the terms, vocabularies, and their structure to be exported, imported, and managed as site configuration.\n\nThe module doesn\u0027t sufficiently check access for the edit and delete operations. Users with \"access content\" permission can edit or delete any term. The edit form may expose term data that users could not otherwise see, since there is no term view route by default.\n\nThis vulnerability is slightly mitigated by the fact that an attacker must have a role with the permission \"access content\", so may not be accessible to anonymous users on all sites.",
"id": "DRUPAL-CONTRIB-2022-047",
"modified": "2023-08-10T21:35:49.000Z",
"published": "2022-06-29T17:25:39.000Z",
"references": [
{
"type": "WEB",
"url": "https://www.drupal.org/sa-contrib-2022-047"
}
],
"schema_version": "1.7.0"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…