Vulnerability Description
Drupal 8 before 8.2.8 and 8.3 before 8.3.1 allows critical access bypass by authenticated users if the RESTful Web Services (rest) module is enabled and the site allows PATCH requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Drupal | Drupal | 8.0.0 |
References
- http://www.securityfocus.com/bid/97941Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038371
- https://www.drupal.org/SA-CORE-2017-002PatchVendor Advisory
- http://www.securityfocus.com/bid/97941Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038371
- https://www.drupal.org/SA-CORE-2017-002PatchVendor Advisory
FAQ
What is CVE-2017-6919?
CVE-2017-6919 is a vulnerability with a CVSS score of 7.5 (HIGH). Drupal 8 before 8.2.8 and 8.3 before 8.3.1 allows critical access bypass by authenticated users if the RESTful Web Services (rest) module is enabled and the site allows PATCH requests.
How severe is CVE-2017-6919?
CVE-2017-6919 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-6919?
Check the references section above for vendor advisories and patch information. Affected products include: Drupal Drupal.