mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 14:08:13 +00:00
Update CVE-2022-25273.json
This commit is contained in:
parent
7083ac437b
commit
b73c123b83
@ -1,18 +1,55 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"dataType": "CVE_RECORD",
|
||||||
"data_format": "MITRE",
|
"dataVersion": "5.0",
|
||||||
"data_version": "4.0",
|
"cveMetadata": {
|
||||||
"CVE_data_meta": {
|
"cveId": "CVE-2022-25273",
|
||||||
"ID": "CVE-2022-25273",
|
"assignerOrgId": "00000000-0000-4000-9000-000000000000",
|
||||||
"ASSIGNER": "cve@mitre.org",
|
"state": "PUBLISHED"
|
||||||
"STATE": "RESERVED"
|
},
|
||||||
},
|
"containers": {
|
||||||
"description": {
|
"cna": {
|
||||||
"description_data": [
|
"providerMetadata": {
|
||||||
|
"orgId": "00000000-0000-4000-9000-000000000000"
|
||||||
|
},
|
||||||
|
"affected": [
|
||||||
|
{
|
||||||
|
"vendor": "Drupal",
|
||||||
|
"product": "core",
|
||||||
|
"versions": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"status": "affected",
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"version": "9.3",
|
||||||
|
"lessThanOrEqual": "9.3.12",
|
||||||
|
"versionType": "custom"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"status": "affected",
|
||||||
|
"version": "9.2",
|
||||||
|
"lessThanOrEqual": "9.2.18",
|
||||||
|
"versionType": "custom"
|
||||||
}
|
}
|
||||||
]
|
],
|
||||||
|
"defaultStatus": "unknown"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.\n",
|
||||||
|
"supportingMedia": [
|
||||||
|
{
|
||||||
|
"type": "text/html",
|
||||||
|
"base64": false,
|
||||||
|
"value": "<span style=\"background-color: rgb(255, 255, 255);\">Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.</span><br>"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.drupal.org/sa-core-2022-008"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
}
|
||||||
}
|
}
|
Loading…
x
Reference in New Issue
Block a user