Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-5256", "assignerOrgId": "2c85b837-eb8b-40ed-9d74-228c62987387", "state": "PUBLISHED", "assignerShortName": "drupal", "dateReserved": "2023-09-28T18:13:12.881Z", "datePublished": "2023-09-28T18:17:43.128Z", "dateUpdated": "2024-09-23T18:25:29.327Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Core", "vendor": "Drupal", "versions": [{"lessThanOrEqual": "10.1.4", "status": "affected", "version": "10.1", "versionType": "semver"}, {"lessThanOrEqual": "10.0.11", "status": "affected", "version": "10.0", "versionType": "semver"}, {"lessThanOrEqual": "9.5.11", "status": "affected", "version": "9.5", "versionType": "semver"}]}], "datePublic": "2023-09-21T18:17:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.</p><p>This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API.</p><p>The core REST and contributed GraphQL modules are not affected.</p><br><br>"}], "value": "In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.\n\nThis vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API.\n\nThe core REST and contributed GraphQL modules are not affected.\n\n\n\n"}], "impacts": [{"capecId": "CAPEC-141", "descriptions": [{"lang": "en", "value": "CAPEC-141 Cache Poisoning"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "2c85b837-eb8b-40ed-9d74-228c62987387", "shortName": "drupal", "dateUpdated": "2023-09-28T18:17:43.128Z"}, "references": [{"url": "https://www.drupal.org/sa-core-2023-006"}], "source": {"discovery": "UNKNOWN"}, "title": "Drupal core - Critical - Cache poisoning - SA-CORE-2023-006", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T07:52:08.530Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.drupal.org/sa-core-2023-006", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "drupal", "product": "drupal", "cpes": ["cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "10.1", "status": "affected", "lessThan": "10.1.4", "versionType": "semver"}, {"version": "10.0", "status": "affected", "lessThan": "10.0.11", "versionType": "semver"}, {"version": "9.5", "status": "affected", "lessThan": "9.5.11", "versionType": "custom"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-09-23T18:22:43.682965Z", "id": "CVE-2023-5256", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-23T18:25:29.327Z"}}]}}