#VU1195 PHP code injection in Elysia Cron


Published: 2016-11-30 | Updated: 2016-12-05

Vulnerability identifier: #VU1195

Vulnerability risk: Medium

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-94

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Elysia Cron
Client/Desktop applications / Software for system administration

Vendor: Drupal

Description

The vulnerability allows a remote privileged attacker to execute arbitrary PHP code.

The vulnerability exists due to design error, allowing users with role "Administer elysia cron" to inject and execute arbitrary PHP code on the target system.

Successful exploitation of the vulnerability may allow an attacker to execute arbitrary PHP coed on the target system with privileges of the web server.

Mitigation

To mitigate the vulnerability grant "Administer elysia cron" role to trusted users only.

Vulnerable software versions

Elysia Cron: 7.x-2.0 - 7.x-2.3


External links
http://www.drupal.org/node/2831900


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability