First published: Thu Aug 29 2024(Updated: )
`core/authorize.php` in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of `hash_salt` is `file_get_contents` of a file that does not exist.
Credit: mlhess@drupal.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/drupal/core | >=8.0.0<10.2.9 | 10.2.9 |
composer/drupal/core-recommended | >=8.0.0<10.2.9 | 10.2.9 |
composer/drupal/drupal | >=8.0.0<10.2.9 | 10.2.9 |
composer/drupal/core | >=10.3.0<10.3.6 | 10.3.6 |
composer/drupal/core-recommended | >=10.3.0<10.3.6 | 10.3.6 |
composer/drupal/drupal | >=10.3.0<10.3.6 | 10.3.6 |
composer/drupal/core | >=11.0.0<11.0.5 | 11.0.5 |
composer/drupal/core-recommended | >=11.0.0<11.0.5 | 11.0.5 |
composer/drupal/drupal | >=11.0.0<11.0.5 | 11.0.5 |
Drupal | =2023-05-09 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45440 is classified as a moderate severity vulnerability.
To fix CVE-2024-45440, upgrade to Drupal versions 10.2.9, 10.3.6, or 11.0.5 or later.
CVE-2024-45440 exploits a Full Path Disclosure vulnerability in core/authorize.php in specific versions of Drupal.
CVE-2024-45440 can potentially expose sensitive file path information on Drupal sites.
Yes, CVE-2024-45440 is specifically present in Drupal 11.x-dev.