This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API.
The core REST and contributed GraphQL modules are not affected.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2586 | In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation. This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API. The core REST and contributed GraphQL modules are not affected. |
Github GHSA |
GHSA-rjqg-3h9m-fx5x | Cache poisoning in drupal/core |
| Link | Providers |
|---|---|
| https://www.drupal.org/sa-core-2023-006 |
|
Mon, 23 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: drupal
Published:
Updated: 2024-09-23T18:25:29.327Z
Reserved: 2023-09-28T18:13:12.881Z
Link: CVE-2023-5256
Updated: 2024-08-02T07:52:08.530Z
Status : Modified
Published: 2023-09-28T19:15:10.977
Modified: 2024-11-21T08:41:23.240
Link: CVE-2023-5256
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA