In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Sep 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | PHAR stream wrapper Arbitrary PHP code execution | PHAR stream wrapper Arbitrary PHP code execution |
MITRE
Status: PUBLISHED
Assigner: drupal
Published: 2019-01-22T15:00:00Z
Updated: 2024-09-16T20:06:38.516Z
Reserved: 2019-01-15T00:00:00
Link: CVE-2019-6339
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-01-22T15:29:00.660
Modified: 2024-11-21T04:46:26.487
Link: CVE-2019-6339
Redhat
No data.