Remote PHP code execution in Elysia Cron for Drupal



Published: 2016-12-05
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID N/A
CWE-ID CWE-94
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Elysia Cron
Client/Desktop applications / Software for system administration

Vendor Drupal

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) PHP code injection

EUVDB-ID: #VU1195

Risk: Medium

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote privileged attacker to execute arbitrary PHP code.

The vulnerability exists due to design error, allowing users with role "Administer elysia cron" to inject and execute arbitrary PHP code on the target system.

Successful exploitation of the vulnerability may allow an attacker to execute arbitrary PHP coed on the target system with privileges of the web server.

Mitigation

To mitigate the vulnerability grant "Administer elysia cron" role to trusted users only.

Vulnerable software versions

Elysia Cron: 7.x-2.0 - 7.x-2.3

External links

http://www.drupal.org/node/2831900


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###