Docs: No need for capitalization

This commit is contained in:
ybasford 2022-08-29 12:29:25 +03:00 committed by Mike Salvatore
parent 159eb2b45b
commit 2783db69b9
1 changed files with 8 additions and 8 deletions

View File

@ -5,31 +5,31 @@ draft: false
tags: ["exploit", "linux", "windows"] tags: ["exploit", "linux", "windows"]
--- ---
The Drupal exploiter exploits [CVE-2019-6340](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6340) The Drupal exploiter exploits [CVE-2019-6340](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6340)
on a vulnerable Drupal server. on a vulnerable Drupal server.
### Description ### Description
Some field types do not properly sanitize data from non-form sources in certain versions Some field types do not properly sanitize data from non-form sources in certain versions
of Drupal server. of Drupal server.
This can lead to arbitrary PHP code execution in some cases. This can lead to arbitrary PHP code execution in some cases.
### Affected Versions ### Affected versions
* Drupal 8.5.x (before 8.5.11) and Drupal 8.6.x (before 8.6.10). * Drupal 8.5.x (before 8.5.11) and Drupal 8.6.x (before 8.6.10).
One of the following conditions must hold: One of the following conditions must hold:
* The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH * The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH
or POST requests; OR or POST requests; OR
* The site has another web services module enabled, like JSON:API in * The site has another web services module enabled, like JSON:API in
Drupal 8, or Services or RESTful Web Services in Drupal 7. Drupal 8, or Services or RESTful Web Services in Drupal 7.
### Notes ### Notes
* The Infection Monkey exploiter implementation is based on an open-source * The Infection Monkey exploiter implementation is based on an open-source
[Python implementation](https://gist.github.com/leonjza/d0ab053be9b06fa020b66f00358e3d88/f9f6a5bb6605745e292bee3a4079f261d891738a) [Python implementation](https://gist.github.com/leonjza/d0ab053be9b06fa020b66f00358e3d88/f9f6a5bb6605745e292bee3a4079f261d891738a)
of the exploit by @leonjza. of the exploit by @leonjza.
* For the full attack to work, more than one vulnerable URL is required. * For the full attack to work, more than one vulnerable URL is required.