mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
88 lines
4.3 KiB
Markdown
88 lines
4.3 KiB
Markdown
### [CVE-2019-6340](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6340)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.exploit-db.com/exploits/46452/
|
|
- https://www.exploit-db.com/exploits/46459/
|
|
- https://www.exploit-db.com/exploits/46510/
|
|
|
|
#### Github
|
|
- https://github.com/0x4D5352/rekall-penetration-test
|
|
- https://github.com/0xT11/CVE-POC
|
|
- https://github.com/189569400/Meppo
|
|
- https://github.com/20142995/sectool
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/Aprillia01/auto-Exploiter
|
|
- https://github.com/CVEDB/PoC-List
|
|
- https://github.com/CVEDB/awesome-cve-repo
|
|
- https://github.com/CVEDB/top
|
|
- https://github.com/DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass
|
|
- https://github.com/DynamicDesignz/Alien-Framework
|
|
- https://github.com/Elsfa7-110/kenzer-templates
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/HimmelAward/Goby_POC
|
|
- https://github.com/JERRY123S/all-poc
|
|
- https://github.com/JSchauert/Penetration-Testing-2
|
|
- https://github.com/JSchauert/Project-2-Offensive-Security-CTF
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/PleXone2019/ICG-AutoExploiterBoT
|
|
- https://github.com/SexyBeast233/SecBooks
|
|
- https://github.com/WingsSec/Meppo
|
|
- https://github.com/Z0fhack/Goby_POC
|
|
- https://github.com/amcai/myscan
|
|
- https://github.com/antonio-fr/DrupalRS
|
|
- https://github.com/anuslok2/IC
|
|
- https://github.com/ayhan-dev/Drupal-RCE-Checker
|
|
- https://github.com/borahan951/priv8.mechploit
|
|
- https://github.com/cved-sources/cve-2019-6340
|
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
|
- https://github.com/d1vious/cve-2019-6340-bits
|
|
- https://github.com/developer3000S/PoC-in-GitHub
|
|
- https://github.com/dobyfreejr/Project-2
|
|
- https://github.com/fara-jav/My_YML_File
|
|
- https://github.com/g0rx/Drupal-SA-CORE-2019-003
|
|
- https://github.com/hectorgie/PoC-in-GitHub
|
|
- https://github.com/hktalent/TOP
|
|
- https://github.com/hktalent/bug-bounty
|
|
- https://github.com/honeybot/wtf-plugin-honeybot-cve_2019_6340
|
|
- https://github.com/huan-cdm/secure_tools_link
|
|
- https://github.com/itsamirac1e/Offensive_Security_CTF_Rekall
|
|
- https://github.com/jas502n/CVE-2019-6340
|
|
- https://github.com/jbmihoub/all-poc
|
|
- https://github.com/josehelps/cve-2019-6340-bits
|
|
- https://github.com/knqyf263/CVE-2019-6340
|
|
- https://github.com/koala2099/GitHub-Chinese-Top-Charts
|
|
- https://github.com/koutto/jok3r-pocs
|
|
- https://github.com/lp008/Hack-readme
|
|
- https://github.com/ludy-dev/drupal8-REST-RCE
|
|
- https://github.com/merlinepedra/nuclei-templates
|
|
- https://github.com/merlinepedra25/nuclei-templates
|
|
- https://github.com/mussar0x4D5352/rekall-penetration-test
|
|
- https://github.com/neilzhang1/Chinese-Charts
|
|
- https://github.com/nobodyatall648/CVE-2019-6340
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/opflep/Drupalgeddon-Toolkit
|
|
- https://github.com/oways/CVE-2019-6340
|
|
- https://github.com/pg001001/deception-tech
|
|
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
|
|
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
|
|
- https://github.com/resistezauxhackeurs/outils_audit_cms
|
|
- https://github.com/sobinge/nuclei-templates
|
|
- https://github.com/superfish9/pt
|
|
- https://github.com/tolgadevsec/Awesome-Deception
|
|
- https://github.com/weeka10/-hktalent-TOP
|
|
- https://github.com/zeralot/Dectect-CVE
|
|
- https://github.com/zhzyker/exphub
|
|
- https://github.com/zoroqi/my-awesome
|
|
|