Arbitrary code execution in Drupal - #VU582
Published: September 21, 2016
Vulnerability identifier: #VU582
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Drupal
Affected software:
Drupal
Drupal
Detailed vulnerability description
The vulnerability allows a remote user to cause arbitrary code execution on the target system.
The weakness exists due to improper dynamic script handlers. Attackers upload dynamic script with multiple extensions such as file.php.pps or file.sh.txt that if accessed from a web browser causes the internal script execution.
Successful exploitation of the vulnerability allows a malicious user to cause arbitrary code execution on the vulnerable system.
The weakness exists due to improper dynamic script handlers. Attackers upload dynamic script with multiple extensions such as file.php.pps or file.sh.txt that if accessed from a web browser causes the internal script execution.
Successful exploitation of the vulnerability allows a malicious user to cause arbitrary code execution on the vulnerable system.
Remediation
Update 4.6.x to 4.6.8.
http://ftp.osuosl.org/pub/drupal/files/projects/drupal-4.6.8.tar.gz
Update 4.7.x to 4.7.2.
http://ftp.osuosl.org/pub/drupal/files/projects/drupal-4.7.2.tar.gz
http://ftp.osuosl.org/pub/drupal/files/projects/drupal-4.6.8.tar.gz
Update 4.7.x to 4.7.2.
http://ftp.osuosl.org/pub/drupal/files/projects/drupal-4.7.2.tar.gz