Three vulnerabilities in Drupal



Published: 2017-03-17
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2017-6377
CVE-2017-6379
CVE-2017-6381
CWE-ID CWE-284
CWE-352
CWE-94
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Drupal
Web applications / CMS

Vendor Drupal

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU6108

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-6377

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to access potentially sensitive information.

The vulnerability exists due to incorrect permissions assigned for uploaded private files using a configured text editor (like CKEditor). The editor does not correctly check access for the file being attached, which can lead to disclosure of private files.

Mitigation

Update to version 8.2.7.

Vulnerable software versions

Drupal: 8.0.0 - 8.2.6

External links

http://www.drupal.org/SA-2017-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Cross-site request forgery

EUVDB-ID: #VU6109

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-6379

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform CSRF attacks.

The vulnerability exists due to certain administrative forms do not have protection against CSRF attacks. A remote attacker can create a specially crafted website, trick the logged-in administrator to visit it and disable some blocks on affected website.

Successful exploitation of the vulnerability requires knowledge of block identifier.

Mitigation

Update to version 8.2.7.

Vulnerable software versions

Drupal: 8.0.0 - 8.2.6

External links

http://www.drupal.org/SA-2017-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) PHP code injection

EUVDB-ID: #VU6110

Risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-6381

CWE-ID: CWE-94 - Improper Control of Generation of Code ('Code Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary PHP code on the target system.

The vulnerability exists due to usage of a 3rd party development library in Drupal before 8.2.2. A remote attacker send a specially crafted request to /vendor/phpunit URL and execute arbitrary PHP code on the server.

Mitigation

Update to version 8.2.7.

Vulnerable software versions

Drupal: 8.0.0 - 8.2.1

External links

http://www.drupal.org/SA-2017-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###