News

Drupal fixes critical Remote Code Execution vulnerability, patch now

Drupal, a popular CMS and blogging platform has patched a remote code execution vulnerability, CVE-2020-13671.

Today, over half a million sites use Drupal, as such applying updates for critical vulnerabilities like these immediately is vital.

The vulnerability also tracked as SA-CORE-2020-012, exists due to improper validation of filenames of files uploaded to Drupal websites.

A remote attacker can upload files with crafted filenames. Since the vulnerable versions do not properly sanitize these filenames, it is possible to trick the uploader into treating a file as, say, PHP, and have it execute arbitrary code on the server.

“Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations,” states Drupal’s security advisory.

Multiple patched versions released

Drupal has released patches for multiple versions, depending on what branch you are using:

“Versions of Drupal 8 prior to 8.8.x are end-of-life and do not receive security coverage,” states the advisory.

In addition, for due diligence, website admins should check all previously uploaded files for malicious extensions.

The security advisory suggests looking for files with more than one extension, such as filename.php.txt or filename.html.gif.

These files are really PHP or HTML files containing code but have been disguised as text/image files via a misleading file extension.

“Look specifically for files that include more than one extension, like filename.php.txt or filename.html.gif, without an underscore (_) in the extension. Pay specific attention to the following file extensions, which should be considered dangerous even when followed by one or more additional extensions:”

  • phar
  • php
  • pl
  • py
  • cgi
  • asp
  • js
  • html
  • htm
  • phtml

“This list is not exhaustive, so evaluate security concerns for other unmunged extensions on a case-by-case basis.”

Multiple researchers have been credited for reporting this vulnerability: ufku, Mark Ferree, Frédéric G. Marand, Samuel Mortenson of the Drupal Security Team, and Derek Wright.

Users are advised to upgrade their Drupal instances to the fixed versions as soon as possible. Also, remember to perform additional auditing steps mentioned above to minimize the possibility of a potential security compromise.

Ax Sharma

Ax Sharma is a UK-based security researcher, journalist and TV subject matter expert experienced in malware analysis and cybercrime investigations. His areas of interest include open source software security and threat intel analysis. Frequently featured by leading media outlets like the BBC, Channel 5, Fortune, WIRED, The Register, among others, Ax is an active community member of the OWASP Foundation and the British Association of Journalists (BAJ).

Recent Posts

Security firm accuses rival of “stealing” its research, backdating blogs

Same vulnerability. Different story. A security firm, FuzzingLabs is accusing a rival (Gecko Security) of…

3 weeks ago

ParkMobile’s $32.8 Million Data Breach Settlement = You get $1?

In 2021, parking app ParkMobile suffered a massive data breach impacting 22 million users whose…

4 weeks ago

8 Brutal Truths About Cybersecurity I Wish I Knew

When I first got into cybersecurity, I thought it was all about hackers in hoodies…

1 month ago

US Air Force Probes Potential SharePoint-Linked Privacy Breach

The US Air Force is investigating a “privacy-related issue” that may have exposed personally identifiable…

1 month ago

Harrods third-party breach exposes 430,000 customer records, hackers reach out

London’s iconic department store Harrods has disclosed that approximately 430,000 customer records were compromised in…

1 month ago

WestJet confirms customer ID, passports stolen in June cyberattack

WestJet confirmed that in a June 2025 cybersecurity incident, a “sophisticated, criminal third party” gained…

1 month ago

This website uses cookies.