Drupal RESTWS Module Page Callback RCE

critical Web App Scanning Plugin ID 98219

Synopsis

Drupal RESTWS Module Page Callback RCE

Description

The version of Drupal running on the remote web server is affected by a remote code execution vulnerability in the bundled RESTful Web services (RESTWS) module due to a flaw in how default page callbacks for Drupal entities are altered when handling specially crafted requests. An unauthenticated, remote attacker can exploit this, via a crafted request, to execute arbitrary PHP code.

Solution

Upgrade to RESTful Web Services 7.x-1.7 / 7.x-2.6 or later.

See Also

https://www.drupal.org/node/2765567

https://www.drupal.org/project/restws

Plugin Details

Severity: Critical

ID: 98219

Type: remote

Published: 6/6/2018

Updated: 9/7/2021

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS Score Source: Tenable

Vulnerability Information

Patch Publication Date: 3/28/2018

Vulnerability Publication Date: 7/13/2016

Reference Information

BID: 141464