HomePentest-Tools.com Logo

Drupal 7.x, 8.x, 9.x RCE Vulnerability (SA-CORE-2020-012) - Windows CVE-2020-13671

Severity
CVSSv3 Score
8.8
Vulnerability description

Drupal is prone to a remote code execution (RCE) vulnerability.

Risk description

Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations.

Recommendation

Update to version 7.74, 8.8.11, 8.9.9, 9.0.8 or later. Additionally, its recommended that you audit all previously uploaded files to check for malicious extensions. Look specifically for files that include more than one extension, like filename.php.txt or filename.html.gif, without an underscore (_) in the extension. Pay specific attention to the following file extensions, which should be considered dangerous even when followed by one or more additional extensions: - phar - php - pl - py - cgi - asp - js - html - htm - phtml This list is not exhaustive, so evaluate security concerns for other unmunged extensions on a case-by-case basis.

Codename
Not available
Detectable with
Network Scanner
Scan engine
OpenVAS
Exploitable with Sniper
No
CVE Published
Nov 20, 2020
Detection added at
Software Type
Not available
Vendor
Not available
Product
Not available