gsd-2018-7602
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-7602", "description": "A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.", "id": "GSD-2018-7602", "references": [ "https://www.debian.org/security/2018/dsa-4180", "https://security.archlinux.org/CVE-2018-7602", "https://packetstormsecurity.com/files/cve/CVE-2018-7602", "https://ubuntu.com/security/CVE-2018-7602" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-7602" ], "details": "A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.", "id": "GSD-2018-7602", "modified": "2023-12-13T01:22:32.609103Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "security@drupal.org", "DATE_PUBLIC": "", "ID": "CVE-2018-7602", "STATE": "PUBLIC", "TITLE": "Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-004" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "core", "version": { "version_data": [ { "affected": "\u003c", "version_value": "7.59" }, { "affected": "\u003c", "version_value": "8.5.3" }, { "affected": "\u003c", "version_value": "8.4.8" } ] } } ] }, "vendor_name": "Drupal" } ] } }, "configuration": [], "credit": [ { "lang": "eng", "value": "Reported By: \nDavid Rothstein of the Drupal Security Team\nAlex Pott of the Drupal Security Team\nHeine Deelstra of the Drupal Security Team\nJasper Mattsson\nFixed By: \nDavid Rothstein of the Drupal Security Team\nxjm of the Drupal Security Team\nSamuel Mortenson of the Drupal Security Team\nAlex Pott of the Drupal Security Team\nLee Rowlands of the Drupal Security Team\nHeine Deelstra of the Drupal Security Team\nPere Orga of the Drupal Security Team\nPeter Wolanin of the Drupal Security Team\nTim Plunkett\nMichael Hess of the Drupal Security Team\nNate Lampton\nJasper Mattsson\nNeil Drumm of the Drupal Security Team\nCash Williams of the Drupal Security Team\nDaniel Wehner" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild." } ] }, "exploit": [], "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "44557", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44557/" }, { "name": "1040754", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040754" }, { "name": "[debian-lts-announce] 20180426 [SECURITY] [DLA 1365-1] drupal7 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html" }, { "name": "44542", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44542/" }, { "name": "DSA-4180", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4180" }, { "name": "https://www.drupal.org/sa-core-2018-004", "refsource": "CONFIRM", "url": "https://www.drupal.org/sa-core-2018-004" }, { "name": "103985", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103985" } ] }, "solution": [ { "lang": "eng", "value": "Solution: \nUpgrade to the most recent version of Drupal 7 or 8 core.\n\nIf you are running 7.x, upgrade to Drupal 7.59.\nIf you are running 8.5.x, upgrade to Drupal 8.5.3.\nIf you are running 8.4.x, upgrade to Drupal 8.4.8. (Drupal 8.4.x is no longer supported and we don\u0027t normally provide security releases for unsupported minor releases. However, we are providing this 8.4.x release so that sites can update as quickly as possible. You should update to 8.4.8 immediately, then update to 8.5.3 or the latest secure release as soon as possible.)\nIf you are unable to update immediately, or if you are running a Drupal distribution that does not yet include this security release, you can attempt to apply the patch below to fix the vulnerability until you are able to update completely:\n\nPatch for Drupal 8.x (8.5.x and below)\nPatch for Drupal 7.x\nThese patches will only work if your site already has the fix from SA-CORE-2018-002 applied. (If your site does not have that fix, it may already be compromised.)" } ], "source": { "advisory": "sa-core-2018-004", "defect": [], "discovery": "UNKNOWN" }, "work_around": [] }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c8.4.8||\u003e=8.5.0-alpha0,\u003c8.5.3", "affected_versions": "All versions before 8.4.8, all versions starting from 8.5.0-alpha0 before 8.5.3", "credit": "David Rothstein, Alex Pott, Heine Deelstra, Jasper Mattsson", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2019-10-09", "description": "A remote code execution vulnerability allows attackers to exploit multiple attack vectors on a Drupal site, which can result in the site being compromised.", "fixed_versions": [ "8.4.8", "8.5.3" ], "identifier": "CVE-2018-7602", "identifiers": [ "CVE-2018-7602" ], "not_impacted": "All versions starting from 8.4.8 before 8.5.0-alpha0, all versions starting from 8.5.3", "package_slug": "packagist/drupal/core", "pubdate": "2018-07-19", "solution": "Upgrade to versions 8.4.8, 8.5.3 or above.", "title": "Remote Code Execution", "urls": [ "https://www.drupal.org/sa-core-2018-004" ], "uuid": "7d283d9f-46d8-4dc5-b78d-c157af4d7056" }, { "affected_range": "\u003c8.4.8||\u003e=8.5.0-alpha0,\u003c8.5.3", "affected_versions": "All versions before 8.4.8, all versions starting from 8.5.0-alpha0 before 8.5.3", "credit": "David Rothstein, Alex Pott, Heine Deelstra, Jasper Mattsson", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2019-10-09", "description": "A remote code execution vulnerability allows attackers to exploit multiple attack vectors on a Drupal site, which can result in the site being compromised.", "fixed_versions": [ "8.4.8", "8.5.3" ], "identifier": "CVE-2018-7602", "identifiers": [ "CVE-2018-7602" ], "not_impacted": "All versions starting from 8.4.8 before 8.5.0-alpha0, all versions starting from 8.5.3", "package_slug": "packagist/drupal/drupal", "pubdate": "2018-07-19", "solution": "Upgrade to versions 8.4.8, 8.5.3 or above.", "title": "Remote Code Execution", "urls": [ "https://www.drupal.org/sa-core-2018-004" ], "uuid": "25c48216-397d-46dd-9b9c-9db3207b9c35" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.59", "versionStartIncluding": "7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.4.8", "versionStartIncluding": "8.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.5.3", "versionStartIncluding": "8.5.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@drupal.org", "ID": "CVE-2018-7602" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.drupal.org/sa-core-2018-004", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.drupal.org/sa-core-2018-004" }, { "name": "44557", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44557/" }, { "name": "44542", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44542/" }, { "name": "DSA-4180", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4180" }, { "name": "[debian-lts-announce] 20180426 [SECURITY] [DLA 1365-1] drupal7 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html" }, { "name": "1040754", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040754" }, { "name": "103985", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103985" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2021-04-20T12:52Z", "publishedDate": "2018-07-19T17:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.