Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-6340— Drupal core - Highly critical - Remote Code Execution

KEV EPSS 94.44% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-6340

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Drupal core - Highly critical - Remote Code Execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Drupal 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Drupal是Drupal社区的一套使用PHP语言开发的开源内容管理系统。 Drupal 8.5.11之前的8.5.x版本和Drupal 8.6.10之前的8.6.x版本中存在输入验证漏洞,该漏洞源于一些字段类型没有正确地过滤数据。远程攻击者可利用该漏洞执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
DrupalDrupal Core 8.5 ~ 8.5.11 -

II. Public POCs for CVE-2019-6340

#POC DescriptionSource LinkShenlong Link
1CVE-2019-6340-Drupal SA-CORE-2019-003https://github.com/g0rx/Drupal-SA-CORE-2019-003POC Details
2Environment for CVE-2019-6340 (Drupal)https://github.com/knqyf263/CVE-2019-6340POC Details
3CVE-2019-6340 Drupal 8.6.9 REST Auth Bypass exampleshttps://github.com/DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-BypassPOC Details
4CVE-2019-6340 POC Drupal rcehttps://github.com/oways/CVE-2019-6340POC Details
5cve-2019-6340https://github.com/cved-sources/cve-2019-6340POC Details
6Bits generated while analyzing CVE-2019-6340 Drupal RESTful RCEhttps://github.com/josehelps/cve-2019-6340-bitsPOC Details
7Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340https://github.com/jas502n/CVE-2019-6340POC Details
8(CVE-2019-6340, CVE-2018-7600) drupal8-REST-RCE https://github.com/ludy-dev/drupal8-REST-RCEPOC Details
9Drupal Drupal 8.6.x RCE Exploithttps://github.com/nobodyatall648/CVE-2019-6340POC Details
10Nonehttps://github.com/Sumitpathania03/Drupal-cve-2019-6340POC Details
11Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10 V contain certain field types that do not properly sanitize data from non-form sources, which can lead to arbitrary PHP code execution in some cases.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-6340.yamlPOC Details
12Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/drupal-cve-2019-6340.ymlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-6340

Please Login to view more intelligence information

IV. Related Vulnerabilities

V. Comments for CVE-2019-6340

No comments yet


Leave a comment