Drupal 8 before 8.2.8 and 8.3 before 8.3.1 allows critical access bypass by authenticated users if the RESTful Web Services (rest) module is enabled and the site allows PATCH requests.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97941 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038371 | |
https://www.drupal.org/SA-CORE-2017-002 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/97941 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038371 | |
https://www.drupal.org/SA-CORE-2017-002 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/97941 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038371 - | |
References | () https://www.drupal.org/SA-CORE-2017-002 - Patch, Vendor Advisory |
Information
Published : 2017-04-20 02:59
Updated : 2024-11-21 03:30
NVD link : CVE-2017-6919
Mitre link : CVE-2017-6919
CVE.ORG link : CVE-2017-6919
JSON object : View
Products Affected
drupal
- drupal
CWE