CVE-2015-3373

The Amazon AWS module before 7.x-1.3 for Drupal uses the base URL and AWS access key to generate the access token, which makes it easier for remote attackers to guess the token value and create backups via a crafted URL.
Configurations

Configuration 1 (hide)

cpe:2.3:a:amazon_aws_project:amazon_aws:*:*:*:*:*:drupal:*:*

History

21 Nov 2024, 02:29

Type Values Removed Values Added
References () http://cgit.drupalcode.org/aws_amazon/commit/?id=9377a26 - () http://cgit.drupalcode.org/aws_amazon/commit/?id=9377a26 -
References () http://www.openwall.com/lists/oss-security/2015/01/29/6 - () http://www.openwall.com/lists/oss-security/2015/01/29/6 -
References () http://www.securityfocus.com/bid/74277 - () http://www.securityfocus.com/bid/74277 -
References () https://www.drupal.org/node/2415457 - Patch () https://www.drupal.org/node/2415457 - Patch
References () https://www.drupal.org/node/2415873 - Patch, Vendor Advisory () https://www.drupal.org/node/2415873 - Patch, Vendor Advisory

Information

Published : 2015-04-21 16:59

Updated : 2024-11-21 02:29


NVD link : CVE-2015-3373

Mitre link : CVE-2015-3373

CVE.ORG link : CVE-2015-3373


JSON object : View

Products Affected

amazon_aws_project

  • amazon_aws
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor