Initiativen für
Als nationale Behörde für Cybersicherheit hat das ZCB mehrere Initiativen für bestimmte Zielgruppen entwickelt, die hier vorgestellt werden.
Reference:
Advisory #2019-004
Version:
1.0
Affected software:
Drupal 8.5.x
Drupal 8.6.x
Type:
Remote code execution
CVE/CVSS:
CVE-2019-6340
https://www.drupal.org/sa-core-2019-003
Drupal has released security updates to address a vulnerability in Drupal Core. A remote attacker could exploit this vulnerability to take control of an affected system.
This vulnerability, registered CVE-2019-6340, is considered to be highly critical by Drupal. A proof of concept has been published.
The vulnerability lies in the fact that an attacker could potentially add fields to a form with PUT / PATCH / POST requests, which could allow arbitrary PHP code to be executed remotely.
Vulnerable websites are those that use Drupal 8 RESTful Web Services and allow PATCH and POST requests. In addition to these are websites that have other active modules such as JSON:API with Drupal 8, Services, or RESTful Web Services with Drupal 7.
CERT.be recommends administrator to update their Drupal version.
If patching is not possible immediately, you can mitigate the vulnerability by disabling all web services modules or configure your webserver to not allow PUT/PATCH/POST requests to web services resources.