Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-25275
Summary
In Drupal package, in some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system. Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability. This vulnerability is mitigated by the fact that it only applies when the site sets (Drupal 9) "$config['image.settings']['allow_insecure_derivatives']" or (Drupal 7) "$conf['image_allow_insecure_derivatives']" to "TRUE". The recommended and default setting is "FALSE", and Drupal core does not provide a way to change that in the admin UI. Some sites may require configuration changes following this security release. This issue affects versions prior to 7.91, 8.x, 9.x prior 9.3.19, 9.4.x prior 9.4.3, 10.0.x prior to 10.0.0-alpha7.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- HIGH
- NONE
CWE-200 - Information Exposure
An information exposure vulnerability is categorized as an information flow (IF) weakness, which can potentially allow unauthorized access to otherwise classified information in the application, such as confidential personal information (demographics, financials, health records, etc.), business secrets, and the application's internal environment.
Advisory Timeline
- Published