mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 14:08:13 +00:00
Update CVE-2022-25273.json
This commit is contained in:
parent
b73c123b83
commit
eda09dc4a9
@ -1,55 +1,69 @@
|
|||||||
{
|
{
|
||||||
"dataType": "CVE_RECORD",
|
"CVE_data_meta": {
|
||||||
"dataVersion": "5.0",
|
"ASSIGNER": "cve@mitre.org",
|
||||||
"cveMetadata": {
|
"ID": "CVE-2022-25273",
|
||||||
"cveId": "CVE-2022-25273",
|
"STATE": "RESERVED"
|
||||||
"assignerOrgId": "00000000-0000-4000-9000-000000000000",
|
},
|
||||||
"state": "PUBLISHED"
|
"affects": {
|
||||||
},
|
"vendor": {
|
||||||
"containers": {
|
"vendor_data": [
|
||||||
"cna": {
|
{
|
||||||
"providerMetadata": {
|
"product": {
|
||||||
"orgId": "00000000-0000-4000-9000-000000000000"
|
"product_data": [
|
||||||
},
|
{
|
||||||
"affected": [
|
"product_name": "Core",
|
||||||
{
|
"version": {
|
||||||
"vendor": "Drupal",
|
"version_data": [
|
||||||
"product": "core",
|
{
|
||||||
"versions": [
|
"version_affected": "<",
|
||||||
|
"version_name": "9.3",
|
||||||
|
"version_value": "9.3.12"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "9.2",
|
||||||
|
"version_value": "9.2.18"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"vendor_name": "Drupal"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"data_format": "MITRE",
|
||||||
|
"data_type": "CVE",
|
||||||
|
"data_version": "4.0",
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
{
|
{
|
||||||
"status": "affected",
|
"lang": "eng",
|
||||||
"version": "9.3",
|
"value": "Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data."
|
||||||
"lessThanOrEqual": "9.3.12",
|
|
||||||
"versionType": "custom"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"status": "affected",
|
|
||||||
"version": "9.2",
|
|
||||||
"lessThanOrEqual": "9.2.18",
|
|
||||||
"versionType": "custom"
|
|
||||||
}
|
}
|
||||||
],
|
]
|
||||||
"defaultStatus": "unknown"
|
},
|
||||||
}
|
"problemtype": {
|
||||||
],
|
"problemtype_data": [
|
||||||
"descriptions": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.\n",
|
|
||||||
"supportingMedia": [
|
|
||||||
{
|
{
|
||||||
"type": "text/html",
|
"description": [
|
||||||
"base64": false,
|
{
|
||||||
"value": "<span style=\"background-color: rgb(255, 255, 255);\">Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.</span><br>"
|
"lang": "eng",
|
||||||
|
"value": "Improper input validation "
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
},
|
||||||
],
|
"references": {
|
||||||
"references": [
|
"reference_data": [
|
||||||
{
|
{
|
||||||
"url": "https://www.drupal.org/sa-core-2022-008"
|
"name": "https://www.drupal.org/sa-core-2022-008",
|
||||||
}
|
"refsource": "CONFIRM",
|
||||||
]
|
"url": "https://www.drupal.org/sa-core-2022-008"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user