Drupal.Core.phar.stream.wrapper.Insecure.Deserialization
Description
This indicates an attack attempt to exploit an Insecure Deserialization Vulnerability in Drupal Core
A remote authenticated attacker can craft a PHAR/JPEG polygot file and uploaded it by employing the user/admin profile picture page in Drupal. Then, the attacker can issue a crafted HTTP POST request. When Drupal processes this request, an insecure PHP deserialization will occur. Successful exploitation will result in arbitrary code execution within the security context of the user running Apache web server.
Affected Products
Drupal Core 7.x prior to 7.62
Drupal Core 8.5.x prior to 8.5.9
Drupal Core 8.6.x prior to 8.6.6
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor:
https://www.drupal.org/sa-core-2019-002
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-13 | 14.632 | Sig Added |
2019-04-15 | 14.594 | Default_action:pass:drop |
2019-04-15 | 14.593 | Default_action:drop:pass |
2019-04-12 | 14.592 | Default_action:pass:drop |
2019-04-04 | 14.586 |