Lucene search

K
cve[email protected]CVE-2016-9450
HistoryNov 25, 2016 - 6:59 p.m.

CVE-2016-9450

2016-11-2518:59:02
CWE-345
web.nvd.nist.gov
26
cve-2016-9450
drupal
cache poisoning
remote attackers
security vulnerability
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.7%

The user password reset form in Drupal 8.x before 8.2.3 allows remote attackers to conduct cache poisoning attacks by leveraging failure to specify a correct cache context.

Affected configurations

NVD
Node
drupaldrupalMatch8.0.0
OR
drupaldrupalMatch8.0.0alpha10
OR
drupaldrupalMatch8.0.0alpha11
OR
drupaldrupalMatch8.0.0alpha12
OR
drupaldrupalMatch8.0.0alpha13
OR
drupaldrupalMatch8.0.0alpha14
OR
drupaldrupalMatch8.0.0alpha15
OR
drupaldrupalMatch8.0.0alpha2
OR
drupaldrupalMatch8.0.0alpha3
OR
drupaldrupalMatch8.0.0alpha4
OR
drupaldrupalMatch8.0.0alpha5
OR
drupaldrupalMatch8.0.0alpha6
OR
drupaldrupalMatch8.0.0alpha7
OR
drupaldrupalMatch8.0.0alpha8
OR
drupaldrupalMatch8.0.0alpha9
OR
drupaldrupalMatch8.0.0beta1
OR
drupaldrupalMatch8.0.0beta10
OR
drupaldrupalMatch8.0.0beta11
OR
drupaldrupalMatch8.0.0beta12
OR
drupaldrupalMatch8.0.0beta13
OR
drupaldrupalMatch8.0.0beta14
OR
drupaldrupalMatch8.0.0beta15
OR
drupaldrupalMatch8.0.0beta16
OR
drupaldrupalMatch8.0.0beta2
OR
drupaldrupalMatch8.0.0beta3
OR
drupaldrupalMatch8.0.0beta4
OR
drupaldrupalMatch8.0.0beta6
OR
drupaldrupalMatch8.0.0beta7
OR
drupaldrupalMatch8.0.0beta9
OR
drupaldrupalMatch8.0.0rc1
OR
drupaldrupalMatch8.0.0rc2
OR
drupaldrupalMatch8.0.0rc3
OR
drupaldrupalMatch8.0.0rc4
OR
drupaldrupalMatch8.0.1
OR
drupaldrupalMatch8.0.2
OR
drupaldrupalMatch8.0.3
OR
drupaldrupalMatch8.0.4
OR
drupaldrupalMatch8.0.5
OR
drupaldrupalMatch8.0.6
OR
drupaldrupalMatch8.1.0
OR
drupaldrupalMatch8.1.0beta1
OR
drupaldrupalMatch8.1.0beta2
OR
drupaldrupalMatch8.1.0rc1
OR
drupaldrupalMatch8.1.1
OR
drupaldrupalMatch8.1.2
OR
drupaldrupalMatch8.1.3
OR
drupaldrupalMatch8.1.4
OR
drupaldrupalMatch8.1.5
OR
drupaldrupalMatch8.1.6
OR
drupaldrupalMatch8.1.7
OR
drupaldrupalMatch8.1.8
OR
drupaldrupalMatch8.1.9
OR
drupaldrupalMatch8.1.10
OR
drupaldrupalMatch8.2.0
OR
drupaldrupalMatch8.2.0beta1
OR
drupaldrupalMatch8.2.0beta2
OR
drupaldrupalMatch8.2.0beta3
OR
drupaldrupalMatch8.2.0rc1
OR
drupaldrupalMatch8.2.0rc2
OR
drupaldrupalMatch8.2.1
OR
drupaldrupalMatch8.2.2

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.7%