Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-7602 PoC — Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-004

Source
Associated Vulnerability
Title:Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-004 (CVE-2018-7602)
Description:A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.
Readme
# Drupal 远程代码执行漏洞(CVE-2018-7602)

* 影响软件:drupal
* 方式:对URL中的#进行编码两次,绕过sanitize()函数过滤
* 效果:任意命令执行

## 漏洞环境

执行如下命令启动drupal 7.57的环境:

```bash
docker-compose up -d
```

环境启动后,访问 `http://your-ip:8081/` 将会看到drupal的安装页面,一路默认配置下一步安装。因为没有mysql环境,所以安装的时候可以选择sqlite数据库。

## 漏洞复现

参考[pimps/CVE-2018-7600](https://github.com/pimps/CVE-2018-7600/blob/master/drupa7-CVE-2018-7602.py)的PoC。

如下图所示,执行以下命令即可复现该漏洞。示例命令为 `id`,如图红框中显示,可以执行该命令。

```bash
# "id"为要执行的命令 第一个drupal为用户名 第二个drupal为密码
python3 drupa7-CVE-2018-7602.py -c "id" drupal drupal http://127.0.0.1:8081/
```

![](1.png)
File Snapshot

[4.0K] /data/pocs/843b1a9067cdc74fe3980553cb1bbc17e30de414 ├── [ 45K] 1.png ├── [ 77] docker-compose.yml ├── [ 48] Dockerfile ├── [4.2K] drupa7-CVE-2018-7602.py ├── [ 11] flagA └── [ 928] README.md 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →