Drupal, the fourth popular most popular CMS behind the websites today, has released emergency fixes for some critical flaws. Exploiting these vulnerabilities allows code execution attacks. Drupal confirmed known exploits exist.
Drupal Code Execution Flaws
Reportedly, Drupal has disclosed two serious security flaws, via a recent advisory, that could allow code execution attacks.
As elaborated, two critical severity arbitrary PHP code execution flaws affected the different CMS versions. These include CVE-2020-28948 and CVE-2020-28948.
Describing the issue in the advisory, Drupal stated,
The Drupal project uses the PEAR Archive_Tar library. The PEAR Archive_Tar library has released a security update that impacts Drupal… Multiple vulnerabilities are possible if Drupal is configured to allow .tar, .tar.gz, .bz2, or .tlz file uploads and processes them.
The bug first caught the attention of Luke Stewart whom Drupal has credited in the advisory.
Regarding the fixes, Drupal has released the patches for this vulnerability except for Drupal 8 versions before 8.8.x. It’s because those versions have reached their end-of-life.
Whereas, for other versions, the respective updates are available with Drupal 9.0.9, 8.9.10, 8.8.12, and 7.75. Hence, users of Drupal 9, 8.9, 8.8, and 7 may update to the corresponding patched versions of the CMS.
These updates are specifically important as Drupal has confirmed the existence of known exploits for “one of core’s dependencies”.
While, for situations where updating isn’t possible, Drupal has advised blocking .tar, .tar.gz, .bz2, or .tlz files uploads from untrusted users.
CISA Urged Updating Immediately
Drupal, the United States Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert regarding Drupal updates. As stated in the advisory,
Drupal has released security updates to address vulnerabilities in Drupal 7, 8.8 and earlier, 8.9, and 9.0. An attacker could exploit this vulnerability to take control of an affected system.
Recently, Drupal had also fixed a critical remote code execution vulnerability (CVE-2020-13671). And now, after a week, they have issued the emergency fixes for the two bugs requiring immediate attention of users.
Ensure your website is not vulnerable and enlist a penetration testing company today!.