{"vulnerability": "CVE-2024-13258", "sightings": [{"uuid": "0735ed0a-9455-4ae2-a1af-be3cb77fa848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfdfcdl3jk2l", "content": "", "creation_timestamp": "2025-01-09T19:16:28.147777Z"}, {"uuid": "3bd72a73-7306-45e6-afbf-f559e64940fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113799986053818546", "content": "", "creation_timestamp": "2025-01-09T19:13:03.704745Z"}, {"uuid": "fe58e531-6562-4d00-8d8c-6a06c4146bbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfdgkauqvi2w", "content": "", "creation_timestamp": "2025-01-09T19:38:53.691660Z"}, {"uuid": "09bad3ec-0ef5-4f5e-94ea-669d3175bd9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113805316847032256", "content": "", "creation_timestamp": "2025-01-10T17:48:58.737344Z"}, {"uuid": "048d5f55-e25b-45c7-9b3a-9eac0632a521", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://t.me/cvedetector/14888", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-13258 - \"Drupal JSON API Unauthorized Access\"\", \n  \"Content\": \"CVE ID : CVE-2024-13258 \nPublished : Jan. 9, 2025, 7:15 p.m. | 35\u00a0minutes ago \nDescription : Incorrect Authorization vulnerability in Drupal Drupal REST &amp; JSON API Authentication allows Forceful Browsing.This issue affects Drupal REST &amp; JSON API Authentication: from 0.0.0 before 2.0.13. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T21:06:56.000000Z"}, {"uuid": "fd439d89-e70a-4cba-ac66-a0469f0adab1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-13258", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1021", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-13258\n\ud83d\udd39 Description: Incorrect Authorization vulnerability in Drupal Drupal REST &amp; JSON API Authentication allows Forceful Browsing.This issue affects Drupal REST &amp; JSON API Authentication: from 0.0.0 before 2.0.13.\n\ud83d\udccf Published: 2025-01-09T19:05:29.925Z\n\ud83d\udccf Modified: 2025-01-09T19:05:29.925Z\n\ud83d\udd17 References:\n1. https://www.drupal.org/sa-contrib-2024-022", "creation_timestamp": "2025-01-09T19:15:31.000000Z"}]}