UBUNTU-CVE-2023-31250

Source
https://ubuntu.com/security/CVE-2023-31250
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-31250.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-31250
Related
Published
2023-04-26T19:15:00Z
Modified
2024-10-15T14:11:29Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The file download facility doesn't sufficiently sanitize file paths in certain situations. This may result in users gaining access to private files that they should not have access to. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing private files after updating.

References

Affected packages

Ubuntu:Pro:14.04:LTS / drupal7

Package

Name
drupal7
Purl
pkg:deb/ubuntu/drupal7?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*

7.23-1
7.24-1
7.24-2
7.26-1
7.26-1ubuntu0.1
7.26-1ubuntu0.1+esm1
7.26-1ubuntu0.1+esm2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:16.04:LTS / drupal7

Package

Name
drupal7
Purl
pkg:deb/ubuntu/drupal7?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*

7.38-1
7.41-1
7.44-1ubuntu1~16.04.0
7.44-1ubuntu1~16.04.0+esm1
7.44-1ubuntu1~16.04.0+esm2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}