{"vulnerability": "CVE-2020-13671", "sightings": [{"uuid": "9aa0a3e5-6d52-499a-9818-cecc2a2a9d2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13671", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "c739a383-341e-4754-828d-2122f73ba985", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13671", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971213", "content": "", "creation_timestamp": "2024-12-24T20:25:58.160112Z"}, {"uuid": "6e058334-6bd3-465c-8657-ed897df914cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13671", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:26.000000Z"}, {"uuid": "3be29854-2574-4f09-be6f-e772cd3ff2b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-13671", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8ea2c1cd-a5fa-4b6d-afcd-798522aa121c", "content": "", "creation_timestamp": "2026-02-02T12:28:28.115908Z"}, {"uuid": "eb47aa5d-547b-4298-be2a-266490dbe83b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13671", "type": "seen", "source": "https://t.me/cibsecurity/17408", "content": "\u203c CVE-2020-13671 \u203c\n\nDrupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T07:25:06.000000Z"}, {"uuid": "9a2279db-b1bc-4ea1-b8e3-1e7f8e54a787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13671", "type": "seen", "source": "https://t.me/cKure/2918", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 #Zeroday: CVE-2020-13671; Drupal core - Critical - Remote code execution - SA-CORE-2020-012.\n\nThis is a double extension vulnerability. \n\nhttps://www.drupal.org/sa-core-2020-012", "creation_timestamp": "2020-11-20T18:45:49.000000Z"}, {"uuid": "a9671eba-1c91-4b9f-86d1-0b4ce027ceec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13671", "type": "seen", "source": "https://t.me/arpsyndicate/1402", "content": "#ExploitObserverAlert\n\nCVE-2020-13671\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2020-13671. Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.\n\nFIRST-EPSS: 0.012430000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-05T05:44:46.000000Z"}, {"uuid": "8a52547c-79cd-4d88-a35f-d5a1b685dede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13671", "type": "seen", "source": "https://t.me/cibsecurity/16662", "content": "\u203c CVE-2020-13671 \u203c\n\nDrupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-20T18:42:49.000000Z"}]}