You are here
Home > Preporuke > Nadogradnja za kritičnu ranjivost u CMS-u Drupal

Nadogradnja za kritičnu ranjivost u CMS-u Drupal

  • Detalji os-a: WN7
  • Važnost: URG
  • Operativni sustavi: L, U, M, O, W
  • Kategorije: LSU, FBS, APL, LRH, HPQ, ALL, W08, LDE, LFE, W12, LGE, LUB, W16

View online: https://www.drupal.org/sa-core-2018-004

Project: Drupal core [1]
Date: 2018-April-25
Security risk: *Critical* 17∕25
AC:Basic/A:User/CI:All/II:All/E:Theoretical/TD:Default [2]
Vulnerability: Remote Code Execution

Description: 
A remote code execution vulnerability exists within multiple subsystems of
Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple
attack vectors on a Drupal site, which could result in the site being
compromised. This vulnerability is related to Drupal core – Highly critical –
Remote Code Execution – SA-CORE-2018-002 [3]. While SA-CORE-2018-002 is being
exploited in the wild, this vulnerability is not known to be in active
exploitation as of this release.

Solution: 
Upgrade to the most recent version of Drupal 7 or 8 core.

* If you are running 7.x, upgrade to Drupal 7.59 [4].
* If you are running 8.5.x, upgrade to Drupal 8.5.3 [5].
* If you are running 8.4.x, upgrade to Drupal 8.4.8 [6]. (Drupal 8.4.x is
no
longer supported and we don’t normally provide security releases for
unsupported minor releases [7]. However, we are providing this 8.4.x
release so that sites can update as quickly as possible. You should
update
to 8.4.8 immediately, then update to 8.5.3 or the latest secure release
as
soon as possible.)

If you are unable to update immediately, or if you are running a Drupal
distribution that does not yet include this security release, you can attempt
to apply the patch below to fix the vulnerability until you are able to
update completely:

* Patch for Drupal 8.x [8] (8.5.x and below)
* Patch for Drupal 7.x [9]

These patches will only work if your site already has the fix from
SA-CORE-2018-002 [10] applied. (If your site does not have that fix, it may
already be compromised [11].)

Reported By: 
* David Rothstein [12] of the Drupal Security Team
* Alex Pott [13] of the Drupal Security Team
* Heine Deelstra [14] of the Drupal Security Team
* Jasper Mattsson [15]

Fixed By: 
* David Rothstein [16] of the Drupal Security Team
* xjm [17] of the Drupal Security Team
* Samuel Mortenson [18] of the Drupal Security Team
* Alex Pott [19] of the Drupal Security Team
* Lee Rowlands [20] of the Drupal Security Team
* Heine Deelstra [21] of the Drupal Security Team
* Pere Orga [22] of the Drupal Security Team
* Peter Wolanin [23] of the Drupal Security Team
* Tim Plunkett [24]
* Michael Hess [25] of the Drupal Security Team
* Nate Lampton [26]
* Jasper Mattsson [27]
* Neil Drumm [28] of the Drupal Security Team
* Cash Williams [29] of the Drupal Security Team
* Daniel Wehner [30]

[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/sa-core-2018-002
[4] https://www.drupal.org/project/drupal/releases/7.59
[5] https://www.drupal.org/project/drupal/releases/8.5.3
[6] https://www.drupal.org/project/drupal/releases/8.4.8
[7] https://www.drupal.org/core/release-cycle-overview
[8]
https://cgit.drupalcode.org/drupal/rawdiff/?h=8.5.x&id=bb6d396609600d1169da29456ba3db59abae4b7e
[9]
https://cgit.drupalcode.org/drupal/rawdiff/?h=7.x&id=080daa38f265ea28444c540832509a48861587d0
[10] https://www.drupal.org/sa-core-2018-002
[11] https://www.drupal.org/psa-2018-002
[12] https://www.drupal.org/user/124982
[13] https://www.drupal.org/user/157725
[14] https://www.drupal.org/user/17943
[15] https://www.drupal.org/user/521118
[16] https://www.drupal.org/user/124982
[17] https://www.drupal.org/user/65776
[18] https://www.drupal.org/user/2582268
[19] https://www.drupal.org/user/157725
[20] https://www.drupal.org/user/395439
[21] https://www.drupal.org/user/17943
[22] https://www.drupal.org/user/2301194
[23] https://www.drupal.org/user/49851
[24] https://www.drupal.org/user/241634
[25] https://www.drupal.org/user/102818
[26] https://www.drupal.org/user/35821
[27] https://www.drupal.org/user/521118
[28] https://www.drupal.org/user/3064
[29] https://www.drupal.org/user/421070
[30] https://www.drupal.org/user/99340

_______________________________________________
Security-news mailing list
Security-news@drupal.org
Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news

AutorVlatka Misic
Cert idNCERT-REF-2018-04-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa mysql-5.5

Otkriveni su sigurnosni nedostaci u programskom paketu mysql-5.5 za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju preuzimanje kontrole nad...

Close