cvelist/2020/13xxx/CVE-2020-13676.json

74 lines
2.6 KiB
JSON
Raw Normal View History

2020-05-28 22:01:30 +00:00
{
"CVE_data_meta": {
2022-02-11 10:46:20 -05:00
"ASSIGNER": "security@drupal.org",
2020-05-28 22:01:30 +00:00
"ID": "CVE-2020-13676",
2022-02-11 10:46:20 -05:00
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Core",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "9.2",
"version_value": "9.2.6"
},
{
"version_affected": "<",
"version_name": "9.1",
"version_value": "9.1.13"
},
{
"version_affected": "<",
"version_name": "8.9",
"version_value": "8.9.19"
}
]
}
}
]
},
"vendor_name": "Drupal"
}
]
}
2020-05-28 22:01:30 +00:00
},
2022-02-11 10:46:20 -05:00
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-05-28 22:01:30 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-02-11 16:01:22 +00:00
"value": "The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed."
2022-02-11 10:46:20 -05:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284 Improper Access Control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.drupal.org/sa-core-2021-009",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/sa-core-2021-009"
2020-05-28 22:01:30 +00:00
}
]
}
2022-02-11 16:01:22 +00:00
}