CVE-2019-6340

Scores

EPSS

0.944High94.4%
0%20%40%60%80%100%

Percentile: 94.4%

CVSS

8.1High3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-502

Exploits

Exploit ID: CVE-2019-6340

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 46452

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46452

Exploit ID: 46459

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46459

Exploit ID: 46510

Source: exploitdb

URL: https://www.exploit-db.com/exploits/46510

Vulnerable Software (4)

Type: Configuration

Product: drupal7

Operating System: ubuntu trusty 14.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: drupal7

Operating System: ubuntu xenial 16.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: drupal7

Operating System: debian

Trait:
{
  "unaffected": true
}

Source: debian

Type: Configuration

Vendor: drupal

Product: drupal

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "8.5.11",
      "versionStartIncluding": "8.5.0",
      "vulnerable": true
    },
   ...

Source: nvd