First published: Wed Apr 26 2023(Updated: )
The file download facility doesn't sufficiently sanitize file paths in certain situations. This may result in users gaining access to private files that they should not have access to. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing private files after updating.
Credit: mlhess@drupal.org mlhess@drupal.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Drupal | >=7.0<7.96 | |
Drupal Drupal | >=9.4<9.4.14 | |
Drupal Drupal | >=9.5<9.5.8 | |
Drupal Drupal | >=10.0<10.0.8 | |
composer/drupal/core | >=7.0.0<7.96 | 7.96 |
composer/drupal/core | >=9.0.0<9.4.14 | 9.4.14 |
composer/drupal/core | >=9.5.0<9.5.8 | 9.5.8 |
composer/drupal/core | >=10.0.0<10.0.8 | 10.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2023-31250.
CVE-2023-31250 has a severity rating of 6.5 (Medium).
The file download facility vulnerability in CVE-2023-31250 may allow users to gain access to private files they should not have access to.
Drupal versions 7.0 to 7.96, 9.4 to 9.4.14, 9.5 to 9.5.8, and 10.0 to 10.0.8 are affected by CVE-2023-31250.
To fix the file download facility vulnerability in Drupal, review the release notes for your Drupal version and make any required configuration changes following the security release.