ESB-2018.0897 - ALERT [Win][UNIX/Linux][BSD] Drupal: Administrator compromise - Remote/unauthenticated 2018-03-29

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0897
 Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002
                               29 March 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Drupal
Publisher:         Drupal
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
                   BSD variants
Impact/Access:     Administrator Compromise        -- Remote/Unauthenticated
                   Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-7600  

Original Bulletin: 
   https://www.drupal.org/sa-core-2018-002

- --------------------------BEGIN INCLUDED TEXT--------------------

Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002

Project:       Drupal core
Date:          2018-March-28
Security risk: Highly critical 
               21/25 AC:None/A:None/CI:All/II:All/E:Theoretical/TD:Default
Vulnerability: Remote Code Execution
Description:   CVE: CVE-2018-7600

A remote code execution vulnerability exists within multiple subsystems of
Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple
attack vectors on a Drupal site, which could result in the site being
completely compromised.

The security team has written an FAQ about this issue.

Solution: 

Upgrade to the most recent version of Drupal 7 or 8 core.

  * If you are running 7.x, upgrade to Drupal 7.58. (If you are unable to
    update immediately, you can attempt to apply this patch to fix the
    vulnerability until such time as you are able to completely update.)
  * If you are running 8.5.x, upgrade to Drupal 8.5.1. (If you are unable to
    update immediately, you can attempt to apply this patch to fix the
    vulnerability until such time as you are able to completely update.)

Drupal 8.3.x and 8.4.x are no longer supported and we don't normally provide
security releases for unsupported minor releases. However, given the potential
severity of this issue, we are providing 8.3.x and 8.4.x releases that includes
the fix for sites which have not yet had a chance to update to 8.5.0.

Your site's update report page will recommend the 8.5.x release even if you are
on 8.3.x or 8.4.x. Please take the time to update to a supported version after
installing this security update.

  * If you are running 8.3.x, upgrade to Drupal 8.3.9 or apply this patch.
  * If you are running 8.4.x, upgrade to Drupal 8.4.6 or apply this patch.

This issue also affects Drupal 8.2.x and earlier, which are no longer
supported. If you are running any of these versions of Drupal 8, update to a
more recent release and then follow the instructions above.

This issue also affects Drupal 6. Drupal 6 is End of Life. For more information
on Drupal 6 support please contact a D6LTS vendor.

Reported By: 

  * Jasper Mattsson

Fixed By: 

  * Jasper Mattsson
  * Samuel Mortenson Provisional Drupal Security Team member
  * David Rothstein of the Drupal Security Team
  * Jess (xjm) of the Drupal Security Team
  * Michael Hess of the Drupal Security Team
  * Lee Rowlands of the Drupal Security Team
  * Peter Wolanin of the Drupal Security Team
  * Alex Pott of the Drupal Security Team
  * David Snopek of the Drupal Security Team
  * Pere Orga of the Drupal Security Team
  * Neil Drumm of the Drupal Security Team
  * Cash Williams of the Drupal Security Team
  * Daniel Wehner
  * Tim Plunkett

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=V2vA
-----END PGP SIGNATURE-----

« Back to bulletins