Vulnerability identifier: #VU73725
Vulnerability risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-284
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Drupal
Web applications /
CMS
Vendor: Drupal
Description
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions to the page that outputs the markup from phpinfo()
to assist with diagnosing PHP configuration.. A remote attacker who can exploit an XSS vulnerability on the website can retrieve data from the phpinfo() output.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Drupal: 1.7.5.2 - 10.0.4, 4.0 - 4.7.11, 5.x - 5.23, 6.x-dev - 6.38, 7.x-dev - 7.94, 8.0 - 8.0.6, 8.1.0 rc1 - 8.1.10, 8.2.0 beta1 - 8.2.8, 8.3.0 alpha1 - 8.3.9, 8.4.0 alpha1 - 8.4.8, 8.5.0 rc1 - 8.5.15, 8.6.0 rc1 - 8.6.18, 8.7.0 alpha1 - 8.7.14, 8.8.0 alpha1 - 8.8.12, 8.9.0 rc1 - 8.9.20, 9.0.0 alpha1 - 9.0.14, 9.1.0 - 9.1.15, 9.2.0 alpha1 - 9.2.21, 9.3.0 alpha1 - 9.3.22, 9.4.0 alpha1 - 9.4.11, 9.5.0 beta1, 9.5.0 rc1, 9.5.0 beta2, 9.5.0 rc2, 9.5.0, 9.5.1, 9.5.2, 9.5.3, 9.5.4
External links
https://www.drupal.org/sa-core-2023-004
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.