Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-25275
HistoryApr 26, 2023 - 12:00 a.m.

CVE-2022-25275

2023-04-2600:00:00
ubuntu.com
ubuntu.com
13
image module
access control
vulnerability
drupal
configuration
security release
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

43.2%

In some situations, the Image module does not correctly check access to
image files not stored in the standard public files directory when
generating derivative images using the image styles system. Access to a
non-public file is checked only if it is stored in the “private” file
system. However, some contributed modules provide additional file systems,
or schemes, which may lead to this vulnerability. This vulnerability is
mitigated by the fact that it only applies when the site sets (Drupal 9)
$config[‘image.settings’][‘allow_insecure_derivatives’] or (Drupal 7)
$conf[‘image_allow_insecure_derivatives’] to TRUE. The recommended and
default setting is FALSE, and Drupal core does not provide a way to change
that in the admin UI. Some sites may require configuration changes
following this security release. Review the release notes for your Drupal
version if you have issues accessing files or image styles after updating.

OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchdrupal7< anyUNKNOWN
ubuntu16.04noarchdrupal7< anyUNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

43.2%