News

Drupal fixes critical Remote Code Execution vulnerability, patch now

Drupal, a popular CMS and blogging platform has patched a remote code execution vulnerability, CVE-2020-13671.

Today, over half a million sites use Drupal, as such applying updates for critical vulnerabilities like these immediately is vital.

The vulnerability also tracked as SA-CORE-2020-012, exists due to improper validation of filenames of files uploaded to Drupal websites.

A remote attacker can upload files with crafted filenames. Since the vulnerable versions do not properly sanitize these filenames, it is possible to trick the uploader into treating a file as, say, PHP, and have it execute arbitrary code on the server.

“Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations,” states Drupal’s security advisory.

Multiple patched versions released

Drupal has released patches for multiple versions, depending on what branch you are using:

“Versions of Drupal 8 prior to 8.8.x are end-of-life and do not receive security coverage,” states the advisory.

In addition, for due diligence, website admins should check all previously uploaded files for malicious extensions.

The security advisory suggests looking for files with more than one extension, such as filename.php.txt or filename.html.gif.

These files are really PHP or HTML files containing code but have been disguised as text/image files via a misleading file extension.

“Look specifically for files that include more than one extension, like filename.php.txt or filename.html.gif, without an underscore (_) in the extension. Pay specific attention to the following file extensions, which should be considered dangerous even when followed by one or more additional extensions:”

  • phar
  • php
  • pl
  • py
  • cgi
  • asp
  • js
  • html
  • htm
  • phtml

“This list is not exhaustive, so evaluate security concerns for other unmunged extensions on a case-by-case basis.”

Multiple researchers have been credited for reporting this vulnerability: ufku, Mark Ferree, Frédéric G. Marand, Samuel Mortenson of the Drupal Security Team, and Derek Wright.

Users are advised to upgrade their Drupal instances to the fixed versions as soon as possible. Also, remember to perform additional auditing steps mentioned above to minimize the possibility of a potential security compromise.

Ax Sharma

Ax Sharma is a Security Researcher and Tech Reporter. His works and expert analyses have frequently been featured by leading media outlets including the BBC, Business Insider, Fortune, TechCrunch, TechRepublic, The Register, WIRED, among others. Ax's expertise lies in vulnerability research, malware analysis and reverse engineering, open source software and scams investigations. He's an active community member of British Association of Journalists (BAJ) and Canadian Association of Journalists (CAJ).

Recent Posts

Sea Turtle Cyber Espionage Campaign Targets Telecommunication and IT Companies in the Netherlands

Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the…

4 months ago

Rogue WordPress plugin: Threat hunters uncover credit card skimming campaign targeting e-commerce sites

Rogue WordPress Plugin Found to Steal Credit Card Information in Magecart Campaign Threat hunters have…

4 months ago

Albanian Parliament and telco ‘One Albania’ suffer cyber attacks

The Assembly of the Republic of Albania and telecom company One Albania have recently fallen…

4 months ago

Carbanak Banking Malware Resurfaces with Updated Tactics in Ransomware Attacks

The banking malware Carbanak has resurfaced with updated tactics, incorporating attack vendors and techniques to…

4 months ago

Theme park giant Parques Reunidos hit by a ransomware cyber attack

One of the world's largest theme park operators, Parques Reunidos has disclosed a cybersecurity incident.…

1 year ago

Phishing kit screenshots your email domain on the fly to appear real

Phishing kit used by multiple hacked sites generates a log in page on the fly…

1 year ago

This website uses cookies.