Vulnerability identifier: #VU17234
Vulnerability risk: High
CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Drupal
Web applications /
CMS
Vendor: Drupal
Description
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) due to insufficient validation of user-supplied input. A remote attacker can submit specially crafted input and execute arbitrary PHP code.
Mitigation
The vulnerability has been fixed in the versions 7.62, 8.5.9, 8.6.6.
Vulnerable software versions
Drupal: 7.0 - 7.61, 8.5.0 - 8.5.8, 8.6.0 - 8.6.5
External links
http://www.drupal.org/sa-core-2019-002
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.