CVE-2020-13675

Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
References
Link Resource
https://www.drupal.org/sa-core-2021-008 Mitigation Patch Vendor Advisory
https://www.drupal.org/sa-core-2021-008 Mitigation Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://www.drupal.org/sa-core-2021-008 - Mitigation, Patch, Vendor Advisory () https://www.drupal.org/sa-core-2021-008 - Mitigation, Patch, Vendor Advisory

Information

Published : 2022-02-11 16:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13675

Mitre link : CVE-2020-13675

CVE.ORG link : CVE-2020-13675


JSON object : View

Products Affected

drupal

  • drupal
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type