CVE-2020-13675

Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
References
Link Resource
https://www.drupal.org/sa-core-2021-008 Mitigation Patch Vendor Advisory
https://www.drupal.org/sa-core-2021-008 Mitigation Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://www.drupal.org/sa-core-2021-008 - Mitigation, Patch, Vendor Advisory () https://www.drupal.org/sa-core-2021-008 - Mitigation, Patch, Vendor Advisory

18 Feb 2022, 01:44

Type Values Removed Values Added
References (CONFIRM) https://www.drupal.org/sa-core-2021-008 - (CONFIRM) https://www.drupal.org/sa-core-2021-008 - Mitigation, Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-434
CPE cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*

11 Feb 2022, 16:48

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-11 16:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13675

Mitre link : CVE-2020-13675

CVE.ORG link : CVE-2020-13675


JSON object : View

Products Affected

drupal

  • drupal
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type