Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1196 | Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site. |
Github GHSA |
GHSA-v8wr-r69p-mmwx | Unrestricted Upload of File with Dangerous Type in Drupal core |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.drupal.org/sa-core-2021-008 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: drupal
Published:
Updated: 2024-08-04T12:25:16.477Z
Reserved: 2020-05-28T00:00:00
Link: CVE-2020-13675
No data.
Status : Modified
Published: 2022-02-11T16:15:08.367
Modified: 2024-11-21T05:01:44.453
Link: CVE-2020-13675
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA