Drupal - Remote Code Execution (CVE-2018-7600)
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
Drupal is affected by a Remote Code Execution vulnerability, located on the /user/register endpoint. The root cause of this vulnerability consists in a lack of validation in API Ajax form which can be triggered for an OS Command Injection attack. Therefore, an unauthenticated remote attacker could send a crafted HTTP request in order to execute commands on the server.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade Drupal to a version higher or equal of 7.58, 8.3.9, 8.4.6 or 8.5.1.
- References
https://unit42.paloaltonetworks.com/unit42-exploit-wild-drupalgeddon2-analysis-cve-2018-7600
- Codename
- Drupalgeddon2
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Mar 2018
- Published at
- Updated at
- Software Type
- CMS
- Vendor
- Drupal
- Product
- Drupal