cvelist/2019/6xxx/CVE-2019-6340.json

99 lines
3.8 KiB
JSON
Raw Normal View History

2019-01-15 15:04:47 -05:00
{
2019-03-18 04:20:53 +00:00
"CVE_data_meta": {
"ASSIGNER": "security@drupal.org",
"ID": "CVE-2019-6340",
"STATE": "PUBLIC",
"TITLE": "Drupal core - Highly critical - Remote Code Execution"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Drupal Core",
"version": {
"version_data": [
{
"affected": "<",
"version_name": "8.5",
"version_value": "8.5.11"
},
{
"affected": "<",
"version_name": "8.6",
"version_value": "8.6.10"
}
]
}
}
]
},
"vendor_name": "Drupal"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2019-02-20 16:58:18 -05:00
{
2019-03-18 04:20:53 +00:00
"lang": "eng",
"value": "Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)"
2019-02-20 16:58:18 -05:00
}
2019-03-18 04:20:53 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.synology.com/security/advisory/Synology_SA_19_09",
"refsource": "CONFIRM",
"url": "https://www.synology.com/security/advisory/Synology_SA_19_09"
},
{
"name": "46452",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46452/"
},
{
"name": "https://www.drupal.org/sa-core-2019-003",
"refsource": "CONFIRM",
"url": "https://www.drupal.org/sa-core-2019-003"
},
{
"name": "46510",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46510/"
},
{
"name": "107106",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107106"
},
{
"name": "46459",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46459/"
}
]
},
"source": {
"advisory": "SA-CORE-2019-003",
"discovery": "UNKNOWN"
}
}