关联漏洞
标题:
Drupal 安全漏洞
(CVE-2018-7600)
描述:Drupal是Drupal社区所维护的一套用PHP语言开发的免费、开源的内容管理系统。 Drupal中带有默认或通用模块配置的多个子系统存在安全漏洞。远程攻击者可利用该漏洞执行任意代码。以下版本受到影响:Drupal 7.58之前版本,8.3.9之前的8.x版本,8.4.6之前的8.4.x版本,8.5.1之前的8.5.x版本。
描述
💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002
介绍
**IMPORTANT:**
Is provided only for educational or information purposes.
[Protect rules for ModSecurity (by fuzzylogic)](ModSecurity.txt)
[Protect rules for ModRewrite .htaccess](htaccess.txt)
---
**FOR MEDIA:**
Please do not post a link to this repository in your articles, without specifying how to protect against an attack (recommend updating Drupal, setting rules for WAF, etc.)
---
PoC based CheckPoint article.
https://research.checkpoint.com/uncovering-drupalgeddon-2/
by Eyal Shalev, Rotem Reiss and Eran Vaknin
PoC not working on Drupal 7.x. See [here](https://github.com/dreadlocked/Drupalgeddon2) for Drupal 7.x & 8.x
---
CVE-2018-7600 / SA-CORE-2018-002
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
文件快照
[4.0K] /data/pocs/4b369c7603e6898aabc3743cee670f444f8ff9fc
├── [1.3K] exploit.py
├── [ 277] htaccess.txt
├── [ 595] ModSecurity.txt
└── [ 917] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。