Drupal RESTWS Module Page Callback RCE

critical Nessus Plugin ID 92355

Synopsis

A PHP application running on the remote web server is affected by a remote code execution vulnerability.

Description

The version of Drupal running on the remote web server is affected by a remote code execution vulnerability in the bundled RESTful Web services (RESTWS) module due to a flaw in how default page callbacks for Drupal entities are altered when handling specially crafted requests. An unauthenticated, remote attacker can exploit this, via a crafted request, to execute arbitrary PHP code.

Solution

Upgrade to RESTful Web Services 7.x-1.7 / 7.x-2.6 or later.

See Also

https://www.drupal.org/node/2765567

https://www.drupal.org/project/restws

Plugin Details

Severity: Critical

ID: 92355

File Name: drupal_restws_page_callback_rce.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 7/18/2016

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:drupal:drupal, cpe:/a:restful_web_services_project:restws

Required KB Items: www/PHP, installed_sw/Drupal

Patch Publication Date: 7/13/2016

Vulnerability Publication Date: 7/13/2016