In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
History

Mon, 16 Sep 2024 20:15:00 +0000

Type Values Removed Values Added
Title PHAR stream wrapper Arbitrary PHP code execution PHAR stream wrapper Arbitrary PHP code execution

cve-icon MITRE

Status: PUBLISHED

Assigner: drupal

Published: 2019-01-22T15:00:00Z

Updated: 2024-09-16T20:06:38.516Z

Reserved: 2019-01-15T00:00:00

Link: CVE-2019-6339

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-22T15:29:00.660

Modified: 2024-11-21T04:46:26.487

Link: CVE-2019-6339

cve-icon Redhat

No data.