CVE-2017-6928
LowVulnerability Description
Drupal core 7.x versions before 7.57 when using Drupal's private file system, Drupal will check to make sure a user has access to a file before allowing the user to view or download it. This check fails under certain conditions in which one module is trying to grant access to the file and another is trying to deny it, leading to an access bypass vulnerability. This vulnerability is mitigated by the fact that it only occurs for unusual site configurations.
Known Affected Software
55 configuration(s) from 2 vendor(s)
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.53:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.32:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.41:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.42:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.50:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.44:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.51:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.56:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.43:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.52:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.39:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.54:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.31:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.55:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.40:*:*:*:*:*:*:*
cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*
References & Resources
-
https://lists.debian.org/debian-lts-announce/2018/02/msg00030.htmlmlhess@drupal.org Third Party Advisory
-
https://www.debian.org/security/2018/dsa-4123mlhess@drupal.org Issue Tracking
-
https://www.drupal.org/sa-core-2018-001mlhess@drupal.org Vendor Advisory
-
https://lists.debian.org/debian-lts-announce/2018/02/msg00030.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.debian.org/security/2018/dsa-4123af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://www.drupal.org/sa-core-2018-001af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
Severity Details
Weakness Type (CWE)
Incorrect Permission Assignment for Critical Resource
- Description
- The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Class
Key Information
- Published Date
- March 01, 2018
