cvelist/2022/25xxx/CVE-2022-25270.json

69 lines
2.4 KiB
JSON
Raw Normal View History

2022-02-16 23:01:09 +00:00
{
"CVE_data_meta": {
2022-02-16 18:13:13 -05:00
"ASSIGNER": "security@drupal.org",
2022-02-16 23:01:09 +00:00
"ID": "CVE-2022-25270",
2022-02-16 18:13:13 -05:00
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Core",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "9.3.x",
"version_value": "9.3.6"
},
{
"version_affected": "<",
"version_name": "9.2.x",
"version_value": "9.2.13"
}
]
}
}
]
},
"vendor_name": "Drupal"
}
]
}
2022-02-16 23:01:09 +00:00
},
2022-02-16 18:13:13 -05:00
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-02-16 23:01:09 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-02-17 00:01:21 +00:00
"value": "The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the \"access in-place editing\" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed."
2022-02-16 18:13:13 -05:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": " Information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.drupal.org/sa-core-2022-004",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/sa-core-2022-004"
2022-02-16 23:01:09 +00:00
}
]
}
2022-02-17 00:01:21 +00:00
}