Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:DRUPAL-INSECURE-DESERIAL

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Drupal Core phar stream wrapper Insecure Deserialization

Release Date

2019/06/04

Update Number

3177

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Drupal Core phar stream wrapper Insecure Deserialization


This signature detects attempts to exploit a known vulnerability against Drupal. A successful attack can lead to arbitrary code execution.

Extended Description

In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.

Affected Products

  • Debian debian_linux 8.0
  • Debian debian_linux 9.0
  • Drupal drupal 7.0
  • Drupal drupal 7.1
  • Drupal drupal 7.10
  • Drupal drupal 7.11
  • Drupal drupal 7.12
  • Drupal drupal 7.13
  • Drupal drupal 7.14
  • Drupal drupal 7.15
  • Drupal drupal 7.16
  • Drupal drupal 7.17
  • Drupal drupal 7.18
  • Drupal drupal 7.19
  • Drupal drupal 7.2
  • Drupal drupal 7.20
  • Drupal drupal 7.21
  • Drupal drupal 7.22
  • Drupal drupal 7.23
  • Drupal drupal 7.24
  • Drupal drupal 7.25
  • Drupal drupal 7.26
  • Drupal drupal 7.27
  • Drupal drupal 7.28
  • Drupal drupal 7.29
  • Drupal drupal 7.3
  • Drupal drupal 7.30
  • Drupal drupal 7.31
  • Drupal drupal 7.32
  • Drupal drupal 7.33
  • Drupal drupal 7.34
  • Drupal drupal 7.35
  • Drupal drupal 7.36
  • Drupal drupal 7.37
  • Drupal drupal 7.38
  • Drupal drupal 7.39
  • Drupal drupal 7.4
  • Drupal drupal 7.40
  • Drupal drupal 7.41
  • Drupal drupal 7.42
  • Drupal drupal 7.43
  • Drupal drupal 7.44
  • Drupal drupal 7.5
  • Drupal drupal 7.50
  • Drupal drupal 7.51
  • Drupal drupal 7.52
  • Drupal drupal 7.53
  • Drupal drupal 7.54
  • Drupal drupal 7.55
  • Drupal drupal 7.56
  • Drupal drupal 7.57
  • Drupal drupal 7.58
  • Drupal drupal 7.59
  • Drupal drupal 7.6
  • Drupal drupal 7.60
  • Drupal drupal 7.61
  • Drupal drupal 7.7
  • Drupal drupal 7.8
  • Drupal drupal 7.9
  • Drupal drupal 8.5.0
  • Drupal drupal 8.5.1
  • Drupal drupal 8.5.2
  • Drupal drupal 8.5.3
  • Drupal drupal 8.5.4
  • Drupal drupal 8.5.5
  • Drupal drupal 8.5.6
  • Drupal drupal 8.5.7
  • Drupal drupal 8.5.8
  • Drupal drupal 8.6.0
  • Drupal drupal 8.6.1
  • Drupal drupal 8.6.2
  • Drupal drupal 8.6.3
  • Drupal drupal 8.6.4
  • Drupal drupal 8.6.5

References

  • CVE: CVE-2019-6339

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out