Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-1196 Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
Github GHSA Github GHSA GHSA-v8wr-r69p-mmwx Unrestricted Upload of File with Dangerous Type in Drupal core
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: drupal

Published:

Updated: 2024-08-04T12:25:16.477Z

Reserved: 2020-05-28T00:00:00

Link: CVE-2020-13675

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-11T16:15:08.367

Modified: 2024-11-21T05:01:44.453

Link: CVE-2020-13675

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses