|Category:||Web application abuses|
|Title:||Drupal Core Multiple Security Vulnerabilities (SA-CORE-2018-006) (Windows)|
|Summary:||This host is running Drupal and is prone; to multiple security vulnerabilities.|
This host is running Drupal and is prone
to multiple security vulnerabilities.
Drupal is prone to the following vulnerabilities:
- In some conditions, content moderation fails to check a
users access to use certain transitions, leading to an access bypass.
- The path module allows users with the 'administer paths' to create pretty URLs for content.
In certain circumstances the user can enter a particular path that triggers an open redirect to a malicious url.
- Drupal core and contributed modules frequently use a 'destination' query string parameter
in URLs to redirect users to a new destination after completing an action on the current page.
Under certain circumstances, malicious users can use this parameter to construct a URL that will
trick users into being redirected to a 3rd party website, thereby exposing the users to potential
social engineering attacks.
- When sending email some variables were not being sanitized for shell arguments,
which could lead to remote code execution.
- The Contextual Links module doesn't sufficiently validate the requested contextual links.
This vulnerability is mitigated by the fact that an attacker must have a role with the permission 'access contextual links'.
Drupal core versions 7.x before 7.60, 8.5.x before 8.5.8 and 8.6.x before 8.6.2 on Windows.
Upgrade to Drupal core version 7.60, 8.5.8 or 8.6.2 respectively.
|Copyright||Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.