Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-9B8A52FC-89C1-11E9-9BA0-4C72B94353B5: drupal -- Drupal core - Moderately critical

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-9B8A52FC-89C1-11E9-9BA0-4C72B94353B5: drupal -- Drupal core - Moderately critical

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/08/2019
Created
06/11/2019
Added
06/08/2019
Modified
07/22/2019

Description

Drupal Security Team reports:

CVE-2019-11831: By-passing protection of Phar Stream Wrapper Interceptor.

In order to intercept file invocations like file_exists or stat on compromised Phar archives

the base name has to be determined and checked before allowing to be handled by PHP

Phar stream handling.

The current implementation is vulnerable to path traversal leading to scenarios where the

Phar archive to be assessed is not the actual (compromised) file.

Solution(s)

  • freebsd-upgrade-package-drupal7
  • freebsd-upgrade-package-drupal8

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;