QID 154101
Date Published: 2021-10-27
QID 154101: Drupal Core Arbitrary Code Execution Vulnerability (SA-CORE-2020-013)
Drupal is a free and open source content management framework written in PHP and distributed under the GNU General Public License. Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations.
Affected Versions:
Drupal 9.0.x, prior to Drupal 9.0.9
Drupal 8.9.x prior to Drupal 8.9.10
Drupal 8.8.x, prior to Drupal 8.8.12
Drupal 7.x, prior to Drupal 7.75
QID Detection Logic:(Unauthenticated)
This QID checks for vulnerable version of Drupal installed on the target via a version based check.
An attacker using double extension technique can upload arbitrary files to the server. Upon successful exploitation, an attacker can execute arbitrary code on the server, affecting the Confidentiality, Integrity and Availability.
For more information visitDrupal security advisory SA-CORE-2020-013
- SA-CORE-2020-013 -
www.drupal.org/sa-core-2020-013
CVEs related to QID 154101
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SA-CORE-2020-013 |
|