CVE-2023-5256 Vulnerability Details

  /     /     /  

CVE-2023-5256 Metadata Quick Info

CVE Published: 28/09/2023 | CVE Updated: 23/09/2024 | CVE Year: 2023
Source: drupal | Vendor: Drupal | Product: Core
Status : PUBLISHED

CVE-2023-5256 Description

In certain scenarios, Drupal\'s JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation. This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API. The core REST and contributed GraphQL modules are not affected.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-200
CWE Name: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Source: Drupal

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-141
CAPEC Description: CAPEC-141 Cache Poisoning


Source: NVD (National Vulnerability Database).