Critical Remote Code Execution Vulnerabilities Patched by Drupal
#1
Quote:Drupal patched two critical remote code execution vulnerabilities which would have allowed attackers to exploit Drupal CMS installations with versions prior to 7.60, 8.6.2, and 8.5.8.

The first critical vulnerability resided in Drupal's DefaultMailSystem::mail() mailing component and it leads to RCE when sent emails contain variables which were not sanitized for shell arguments. The second critical security issue patched by Drupal was present in the Contextual Links module which did not sufficiently validate requested contextual links.
"This vulnerability is mitigated by the fact that an attacker must have a role with the permission "access contextual links," according to Drupal's SA-CORE-2018-006 security advisory.

Source: https://news.softpedia.com/news/critical...3315.shtml
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
QOwnNotes 19.1.6
25.1.3 The  --...Kool — 15:23
AppCheck Anti-Ransomware 3.1.39.3
Version 3.1.39.3 (...harlan4096 — 07:51
Antivirus Removal Tool 2025.01 (v.1)
An updated version...harlan4096 — 07:48
GFYI [Official] IObit Christmas 2024 Bl...
Merry Christmas and ...divinenews — 19:11
GFYI [Official] Ashampoo Christmas 2024...
Merry Christmas and ...dhruv2193 — 16:55

[-]
Birthdays
Today's Birthdays
avatar (38)ixofehym
Upcoming Birthdays
avatar (49)theoldevext
avatar (44)algratCep
avatar (49)Qlaude2Sap
avatar (43)tabthinLem
avatar (50)Josepharelf
avatar (39)kholukrefar
avatar (48)Lauraimike
avatar (50)WilsonWag
avatar (48)StevenPiole
avatar (39)zetssToomy
avatar (46)GornOr
avatar (44)StephenViedy
avatar (49)Jamesmog
avatar (37)opeqyrav
avatar (38)theatidere
avatar (47)denisEquivok
avatar (35)mikebrian01
avatar (37)ivanoFloom
avatar (40)uxegihor

[-]
Online Staff
There are no staff members currently online.

>