Vulnerabilities > CVE-2017-6919 - Unspecified vulnerability in Drupal

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
high complexity
drupal
nessus

Summary

Drupal 8 before 8.2.8 and 8.3 before 8.3.1 allows critical access bypass by authenticated users if the RESTful Web Services (rest) module is enabled and the site allows PATCH requests.

Nessus

  • NASL familyCGI abuses
    NASL idDRUPAL_8_2_8.NASL
    descriptionAccording to its self-reported version, the instance of Drupal running on the remote web server is 8.x prior to 8.2.8 or 8.3.x prior to 8.3.1. It is, therefore, affected by an access bypass vulnerability due to an unspecified flaw when the RESTful Web Services (rest) module is enabled and the site allows PATCH requests. An authenticated, remote attacker can exploit this to bypass critical access restrictions. Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id99690
    published2017-04-26
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99690
    titleDrupal 8.x < 8.2.8 / 8.3.x < 8.3.1 Access Bypass Vulnerability (SA-CORE-2017-002)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-E8767A2FBB.NASL
    description- [8.3.1](https://www.drupal.org/project/drupal/releases/8 .3.1) - [Drupal Core - Critical - Access Bypass - SA-CORE-2017-002](https://www.drupal.org/SA-CORE-2017-00 2) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-05-02
    plugin id99925
    published2017-05-02
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99925
    titleFedora 24 : drupal8 (2017-e8767a2fbb)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_1455C86C26C211E79DAA6CF0497DB129.NASL
    descriptionDrupal Security Team Reports : CVE-2017-6919: Access bypass
    last seen2020-06-01
    modified2020-06-02
    plugin id99615
    published2017-04-24
    reporterThis script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99615
    titleFreeBSD : drupal8 -- Drupal Core - Critical - Access Bypass (1455c86c-26c2-11e7-9daa-6cf0497db129)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-CCDF272E60.NASL
    description- [8.3.1](https://www.drupal.org/project/drupal/releases/8 .3.1) - [Drupal Core - Critical - Access Bypass - SA-CORE-2017-002](https://www.drupal.org/SA-CORE-2017-00 2) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-07-17
    plugin id101720
    published2017-07-17
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/101720
    titleFedora 26 : drupal8 (2017-ccdf272e60)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2017-041473E742.NASL
    description- [8.3.1](https://www.drupal.org/project/drupal/releases/8 .3.1) - [Drupal Core - Critical - Access Bypass - SA-CORE-2017-002](https://www.drupal.org/SA-CORE-2017-00 2) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2017-05-02
    plugin id99922
    published2017-05-02
    reporterThis script is Copyright (C) 2017-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/99922
    titleFedora 25 : drupal8 (2017-041473e742)

Seebug

bulletinFamilyexploit
descriptionThis is a critical access bypass vulnerability. A site is only affected by this if all of the following conditions are met: * The site has the RESTful Web Services (`rest`) module enabled. * The site allows `PATCH` requests. * An attacker can get or register a user account on the site. While we don't normally provide security releases for [unsupported minor releases](https://www.drupal.org/core/release-cycle-overview), given the potential severity of this issue, we have also provided an 8.2.x release to ensure that sites that have not had a chance to update to 8.3.0 can update safely.
idSSV:92989
last seen2017-11-19
modified2017-04-21
published2017-04-21
reporterRoot
titleDrupal Core - Access Bypass vulnerability (CVE-2017-6919)