Lucene search

K
drupalDrupal Security TeamDRUPAL-SA-CORE-2022-016
HistorySep 28, 2022 - 12:00 a.m.

Drupal core - Critical - Multiple vulnerabilities - SA-CORE-2022-016

2022-09-2800:00:00
Drupal Security Team
www.drupal.org
24
drupal
twig
vulnerabilities
security update
high severity
code
access
administrative permission
templates
database credentials

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.003 Low

EPSS

Percentile

71.2%

Drupal uses the Twig third-party library for content templating and sanitization. Twig has released a security update that affects Drupal. Twig has rated the vulnerability as high severity. Drupal core’s code extending Twig has also been updated to mitigate a related vulnerability. Multiple vulnerabilities are possible if an untrusted user has access to write Twig code, including potential unauthorized read access to private files, the contents of other files on the server, or database credentials. The vulnerability is mitigated by the fact that an exploit is only possible in Drupal core with a restricted access administrative permission. Additional exploit paths for the same vulnerability may exist with contributed or custom code that allows users to write Twig templates.

Affected configurations

Vulners
Node
drupaldrupalRange<9.4.7
OR
drupaldrupalRange<9.3.22
CPENameOperatorVersion
drupallt9.4.7
drupallt9.3.22

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.003 Low

EPSS

Percentile

71.2%