Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-6339— PHAR stream wrapper Arbitrary PHP code execution

EPSS 76.09% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-6339

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PHAR stream wrapper Arbitrary PHP code execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Drupal core 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Drupal core是Drupal社区所维护的一套用PHP语言开发的免费、开源的内容管理系统。 Drupal core 7.62之前的7.x版本、8.6.6之前的8.6.x版本和8.5.9之前的8.5.x版本中的内置phar stream wrapper(PHP)存在远程代码执行漏洞。远程攻击者可利用该漏洞执行任意的php代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
DrupalDrupal core 7.x ~ 7.62 -

II. Public POCs for CVE-2019-6339

#POC DescriptionSource LinkShenlong Link
1Drupal remote code execution vulnerabiltyhttps://github.com/Vulnmachines/drupal-cve-2019-6339POC Details
2Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Drupal%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2019-6339.mdPOC Details
3https://github.com/vulhub/vulhub/blob/master/drupal/CVE-2019-6339/README.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-6339

登录查看更多情报信息。

Same Patch Batch · Drupal · 2019-01-22 · 4 CVEs total

CVE-2017-6922Files uploaded by anonymous users into a private file system can be accessed by other anon
CVE-2019-6338third-party PEAR Archive_Tar library updates
CVE-2017-6923Access bypass in Drupal 8 views

IV. Related Vulnerabilities

V. Comments for CVE-2019-6339

No comments yet


Leave a comment