CVE-2015-5502
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
The Storage API module 7.x-1.x before 7.x-1.8 for Drupal does not properly restrict access to Storage API fields attached to entities that are not nodes, which allows remote attackers to have unspecified impact via unknown vectors.
Known Affected Software
8 configuration(s) from 1 vendor(s)
storage_api
Version:
7.x-1.1
CPE:
cpe:2.3:a:storage_api_project:storage_api:7.x-1.1:*:*:*:*:drupal:*:*
storage_api
Version:
7.x-1.5
CPE:
cpe:2.3:a:storage_api_project:storage_api:7.x-1.5:*:*:*:*:drupal:*:*
storage_api
Version:
7.x-1.3
CPE:
cpe:2.3:a:storage_api_project:storage_api:7.x-1.3:*:*:*:*:drupal:*:*
storage_api
Version:
7.x-1.7
CPE:
cpe:2.3:a:storage_api_project:storage_api:7.x-1.7:*:*:*:*:drupal:*:*
storage_api
Version:
7.x-1.4
CPE:
cpe:2.3:a:storage_api_project:storage_api:7.x-1.4:*:*:*:*:drupal:*:*
storage_api
Version:
7.x-1.0
CPE:
cpe:2.3:a:storage_api_project:storage_api:7.x-1.0:*:*:*:*:drupal:*:*
storage_api
Version:
7.x-1.2
CPE:
cpe:2.3:a:storage_api_project:storage_api:7.x-1.2:*:*:*:*:drupal:*:*
storage_api
Version:
7.x-1.6
CPE:
cpe:2.3:a:storage_api_project:storage_api:7.x-1.6:*:*:*:*:drupal:*:*
This vulnerability affects 8 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://www.openwall.com/lists/oss-security/2015/07/04/4cve@mitre.org
-
http://www.securityfocus.com/bid/74867cve@mitre.org
-
https://www.drupal.org/node/2495895cve@mitre.org Patch
-
https://www.drupal.org/node/2495903cve@mitre.org Patch Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2015/07/04/4af854a3a-2127-422b-91ae-364da2661108
-
http://www.securityfocus.com/bid/74867af854a3a-2127-422b-91ae-364da2661108
-
https://www.drupal.org/node/2495895af854a3a-2127-422b-91ae-364da2661108 Patch
-
https://www.drupal.org/node/2495903af854a3a-2127-422b-91ae-364da2661108 Patch Vendor Advisory
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-284
Improper Access Control
- Description
- The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
- Typical Severity
- Medium
- Abstraction Level
- Pillar
Key Information
- Published Date
- August 18, 2015
