Vulnerability Name: | CVE-2020-13671 (CCN-191949) |
Assigned: | 2020-11-18 |
Published: | 2020-11-18 |
Updated: | 2022-01-01 |
Summary: | Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.
|
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): Single_Instance | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-434
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2020-13671
Source: XF Type: UNKNOWN drupal-cve202013671-code-exec(191949)
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-d50d74d6f2
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-6f1079934c
Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG
Source: CCN Type: SA-CORE-2020-012 Drupal core - Critical - Remote code execution
Source: CONFIRM Type: Vendor Advisory https://www.drupal.org/sa-core-2020-012
Source: CCN Type: IBM Security Bulletin 6410870 (API Connect) IBM API Connect's Developer Portal is vulnerable to arbitrary code excution in Drupal Core (CVE-2020-13671)
Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-13671
|
Vulnerable Configuration: | Configuration 1: cpe:/a:drupal:drupal:*:*:*:*:*:*:*:* (Version >= 7.0 and < 7.74)OR cpe:/a:drupal:drupal:*:*:*:*:*:*:*:* (Version >= 8.8 and < 8.8.11)OR cpe:/a:drupal:drupal:*:*:*:*:*:*:*:* (Version >= 8.9 and < 8.9.9)OR cpe:/a:drupal:drupal:*:*:*:*:*:*:*:* (Version >= 9.0 and < 9.0.8) Configuration 2: cpe:/o:fedoraproject:fedora:32:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:drupal:drupal:7.0:*:*:*:*:*:*:*OR cpe:/a:drupal:drupal:8.8.0:*:*:*:*:*:*:*OR cpe:/a:drupal:drupal:8.9.0:*:*:*:*:*:*:*OR cpe:/a:drupal:drupal:9.0.0:*:*:*:*:*:*:*AND cpe:/a:ibm:api_connect:5.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:api_connect:2018.4.1.0:*:*:*:*:*:*:*OR cpe:/a:ibm:api_connect:2018.4.1.13:*:*:*:*:*:*:*OR cpe:/a:ibm:api_connect:10.0.0.0:*:*:*:*:*:*:*OR cpe:/a:ibm:api_connect:5.0.8.10:*:*:*:*:*:*:*OR cpe:/a:ibm:api_connect:10.0.1.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |