Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-45440 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Full Path Disclosure (FPD) in Drupal 11.x-dev. πŸ“‚ **Consequences**: Server file paths are leaked via `core/authorize.php`.…

Q2Root Cause? (CWE/Flaw)

πŸ› οΈ **Root Cause**: Improper error handling in `core/authorize.php`. πŸ“‰ **Flaw**: If `hash_salt` points to a non-existent file, `file_get_contents` fails and exposes the full path, even if error logging is disabled.…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: Drupal Core. πŸ“¦ **Version**: 11.x-dev (Development versions). 🏒 **Vendor**: Drupal Community. ⚠️ **Note**: Primarily affects dev builds, but check if production uses unstable branches.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Action**: Hackers can read server directory structures. πŸ”“ **Privileges**: No code execution or data theft directly. πŸ“‚ **Data**: Only file paths are exposed. 🧩 **Goal**: Reconnaissance for subsequent exploits.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: Low. 🌐 **Auth**: No authentication required. βš™οΈ **Config**: Triggered by specific `hash_salt` configuration pointing to missing files. πŸš€ **Ease**: Simple HTTP request manipulation.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **Exploit**: Yes, public PoC exists. 🐍 **Tool**: Python script available on GitHub (w0r1i0g1ht). πŸ§ͺ **Scanner**: Nuclei templates available (projectdiscovery). 🌍 **Status**: Active PoC, easy to reproduce.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Visit `http://<target>/core/authorize.php`. πŸ“€ **Observe**: Look for full path errors in response. πŸ› οΈ **Scan**: Use Nuclei template `CVE-2024-45440.yaml`. 🐍 **Run**: Execute the provided Python PoC script.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fix**: Update to patched version (if released). πŸ“ **Official**: Drupal issue tracker #345781 discusses this. βœ… **Status**: Check latest stable release notes for patch inclusion.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Ensure `hash_salt` in `settings.php` points to an existing file. πŸ›‘ **Mitigation**: Disable `authorize.php` access if not needed.…

Q10Is it urgent? (Priority Suggestion)

⚑ **Priority**: Medium. πŸ“‰ **Risk**: Information Disclosure only. πŸ›‘οΈ **Urgency**: Fix if using dev versions. πŸ“… **Timeline**: Patch soon to prevent reconnaissance.…