Synopsis
A PHP application running on the remote web server is affected by a vulnerability.
Description
According to its self-reported version, the instance of Drupal running on the remote web server is 7.x prior to 7.96, 9.4.x prior to 9.4.14, 9.5.x prior to 9.5.8, or 10.x prior to 10.0.8. It is, therefore, affected by a vulnerability.
- The file download facility doesn't sufficiently sanitize file paths in certain situations. This may result in users gaining access to private files that they should not have access to. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing private files after updating. This advisory is covered by Drupal Steward.
Because this vulnerability is not mass exploitable, your Steward partner may respond by monitoring-only, rather than enforcing a new WAF rule. We would normally not apply for a release of this severity. However, in this case we have chosen to apply Drupal Steward security coverage to test our processes. Drupal 7 All Drupal 7 sites on Windows web servers are vulnerable. Drupal 7 sites on Linux web servers are vulnerable with certain file directory structures, or if a vulnerable contributed or custom file access module is installed. Drupal 9 and 10 Drupal 9 and 10 sites are only vulnerable if certain contributed or custom file access modules are installed. (SA-CORE-2023-005)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Upgrade to Drupal version 7.96 / 9.4.14 / 9.5.8 / 10.0.8 or later.
Plugin Details
File Name: drupal_10_0_8.nasl
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:drupal:drupal
Required KB Items: Settings/ParanoidReport, installed_sw/Drupal
Exploit Ease: No known exploits are available
Patch Publication Date: 4/19/2023
Vulnerability Publication Date: 4/19/2023