The user password reset form in Drupal 8.x before 8.2.3 allows remote attackers to conduct cache poisoning attacks by leveraging failure to specify a correct cache context.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/94367 | third party advisory vdb entry |
https://www.drupal.org/SA-CORE-2016-005 | patch vendor advisory |