A highly critical bug has been discovered in Drupal that can be used for remote code execution . Drupal is a Content Management System (CMS) commonly used to host websites. In the past this sort of exploit has been used to deliver remote access tools, ransomware, and cryptominers to web servers . Based on similar exploits against various CMS software in the past, we can expect that attackers will begin exploiting this software quickly.
- A remote attacker can exploit this issue to execute arbitrary commands on the web server.
- Drupal 8.6.X prior to 8.6.10
- Drupal 8.5.10 or earlier
- A number of Drupal 7 contributed Modules
- For a list of modules affected, please see the links in the References section .
To be vulnerable a site must:
- Have the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or
- Have another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7
- If you are using Drupal 8.6.x, upgrade to Drupal 8.6.10.
- If you are using Drupal 8.5.x or earlier, upgrade to Drupal 8.5.11.
- If you are using a version of Drupal 8 prior to 8.5.x it no longer receives security coverage and should be upgraded to a supported release.
- Be sure to install any available security updates for contributed projects after updating Drupal core .
- No core update is required for Drupal 7, but several Drupal 7 contributed modules do require updates .
- If you can not apply any of the above referenced patches at this time, disable all Drupal web services modules, or configure your web server(s) to not allow PUT/PATCH/POST requests to web services.
If you can not apply any of the above referenced patches at this time, disable all Drupal web services modules, or configure your web server(s) to not allow PUT/PATCH/POST requests to web services
Because Open Berkeley does not have Web Services enabled it is not affected by this vulnerability, however, it will be patching the contributed modules.