Drupal 7.x < 7.96 / 9.4.x < 9.4.14 / 9.5.x < 9.5.8 / 10.x < 10.0.8 Drupal Vulnerability (SA-CORE-2023-005)

high Nessus Plugin ID 174488

Synopsis

A PHP application running on the remote web server is affected by a vulnerability.

Description

According to its self-reported version, the instance of Drupal running on the remote web server is 7.x prior to 7.96, 9.4.x prior to 9.4.14, 9.5.x prior to 9.5.8, or 10.x prior to 10.0.8. It is, therefore, affected by a vulnerability.

- The file download facility doesn't sufficiently sanitize file paths in certain situations. This may result in users gaining access to private files that they should not have access to. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing private files after updating. This advisory is covered by Drupal Steward.
Because this vulnerability is not mass exploitable, your Steward partner may respond by monitoring-only, rather than enforcing a new WAF rule. We would normally not apply for a release of this severity. However, in this case we have chosen to apply Drupal Steward security coverage to test our processes. Drupal 7 All Drupal 7 sites on Windows web servers are vulnerable. Drupal 7 sites on Linux web servers are vulnerable with certain file directory structures, or if a vulnerable contributed or custom file access module is installed. Drupal 9 and 10 Drupal 9 and 10 sites are only vulnerable if certain contributed or custom file access modules are installed. (SA-CORE-2023-005)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Drupal version 7.96 / 9.4.14 / 9.5.8 / 10.0.8 or later.

See Also

https://www.drupal.org/sa-core-2023-005

https://www.drupal.org/project/drupal/releases/10.0.8

https://www.drupal.org/project/drupal/releases/7.96

https://www.drupal.org/project/drupal/releases/9.4.14

https://www.drupal.org/project/drupal/releases/9.5.8

https://www.drupal.org/psa-2021-06-29

https://www.drupal.org/steward

Plugin Details

Severity: High

ID: 174488

File Name: drupal_10_0_8.nasl

Version: 1.2

Type: remote

Family: CGI abuses

Published: 4/20/2023

Updated: 5/2/2023

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/a:drupal:drupal

Required KB Items: Settings/ParanoidReport, installed_sw/Drupal

Exploit Ease: No known exploits are available

Patch Publication Date: 4/19/2023

Vulnerability Publication Date: 4/19/2023

Reference Information

IAVA: 2023-A-0218-S