CVE-2018-7600
critical-risk
Published 2018-03-29
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
Do I need to act?
!
94.5% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (4)
References (41)
Broken Link
http://www.securityfocus.com/bid/103534
Broken Link
http://www.securitytracker.com/id/1040598
Third Party Advisory
https://blog.appsecco.com/remote-code-execution-with-drupal-core-sa-core-2018-00...
Third Party Advisory
https://github.com/a2u/CVE-2018-7600
Vendor Advisory
https://groups.drupal.org/security/faq-2018-002
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/03/msg00028.html
Third Party Advisory
https://twitter.com/arancaytar/status/979090719003627521
Third Party Advisory
https://www.debian.org/security/2018/dsa-4156
Vendor Advisory
https://www.drupal.org/sa-core-2018-002
Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_17
Third Party Advisory
https://www.tenable.com/blog/critical-drupal-core-vulnerability-what-you-need-to...
and 21 more references
Get this data via API
curl -H "Authorization: Bearer YOUR_KEY" \
https://cyber.phasetransitions.ai/api/v1/cves/CVE-2018-7600
Free tier: 100 requests/day, no credit card.
76
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
34/34 · Critical
Exposure
10/34 · Low