The user password reset form in Drupal 8.x before 8.2.3 allows remote attackers to conduct cache poisoning attacks by leveraging failure to specify a correct cache context.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha14"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha15"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta10"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta11"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta12"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta13"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta14"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta15"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta16"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta3"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta4"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta6"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta7"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-beta9"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.0-rc4"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.3"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.4"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.5"
},
{
"introduced": "0"
},
{
"last_affected": "8.0.6"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.0"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.0-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.0-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.2"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.3"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.4"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.5"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.6"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.7"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.8"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.9"
},
{
"introduced": "0"
},
{
"last_affected": "8.1.10"
},
{
"introduced": "0"
},
{
"last_affected": "8.2.0"
},
{
"introduced": "0"
},
{
"last_affected": "8.2.0-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "8.2.0-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "8.2.0-beta3"
},
{
"introduced": "0"
},
{
"last_affected": "8.2.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "8.2.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "8.2.1"
},
{
"introduced": "0"
},
{
"last_affected": "8.2.2"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9450.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha12"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha13"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.0-alpha9"
}
]
}
]