Drupal 7.x and 8.x multiple subsystems remote code execution vulnerability - Highly critical
[
{
"product": "core",
"vendor": "Drupal",
"versions": [
{
"lessThan": "7.59",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "8.5.3",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "8.4.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
Source | Link |
---|---|
exploit-db | www.exploit-db.com/exploits/44542/ |
securitytracker | www.securitytracker.com/id/1040754 |
exploit-db | www.exploit-db.com/exploits/44557/ |
debian | www.debian.org/security/2018/dsa-4180 |
securityfocus | www.securityfocus.com/bid/103985 |
drupal | www.drupal.org/sa-core-2018-004 |
lists | www.lists.debian.org/debian-lts-announce/2018/04/msg00030.html |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
destination | query param | /?q=node/1/delete&destination=node?q[%2523post_render][]=passthru%26q[%2523type]=markup%26q[%2523markup]=php%20-r%20'%{PAYLOAD}' | Exploitable query parameter that allows remote code execution via PHP code injection. | CWE-94 |
form_build_id | query param | /?q=file/ajax/actions/cancel/%23options/path/{form_build_id} | Endpoint that can be exploited through the form build ID in the context of Drupal's AJAX actions. | CWE-94 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo