CVE-2020-13675

Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
References
Link Resource
https://www.drupal.org/sa-core-2021-008 Mitigation Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*

History

18 Feb 2022, 01:44

Type Values Removed Values Added
First Time Drupal drupal
Drupal
CWE CWE-434
CPE cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
References (CONFIRM) https://www.drupal.org/sa-core-2021-008 - (CONFIRM) https://www.drupal.org/sa-core-2021-008 - Mitigation, Patch, Vendor Advisory

11 Feb 2022, 16:48

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-11 16:15

Updated : 2023-12-10 14:22


NVD link : CVE-2020-13675

Mitre link : CVE-2020-13675

CVE.ORG link : CVE-2020-13675


JSON object : View

Products Affected

drupal

  • drupal
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type

CWE-284

Improper Access Control