Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-94 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Elysia Cron Client/Desktop applications / Software for system administration |
Vendor | Drupal |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU1195
Risk: Medium
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote privileged attacker to execute arbitrary PHP code.
The vulnerability exists due to design error, allowing users with role "Administer elysia cron" to inject and execute arbitrary PHP code on the target system.
Successful exploitation of the vulnerability may allow an attacker to execute arbitrary PHP coed on the target system with privileges of the web server.
MitigationTo mitigate the vulnerability grant "Administer elysia cron" role to trusted users only.
Vulnerable software versionsElysia Cron: 7.x-2.0 - 7.x-2.3
External linkshttp://www.drupal.org/node/2831900
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.