exploitdb
WORKING POC
VERIFIED
by José Ignacio Rojo · rubyremotephp
https://www.exploit-db.com/exploits/44482
This Metasploit module exploits CVE-2018-7600 (Drupalgeddon2) to achieve remote code execution on vulnerable Drupal installations by leveraging form API manipulation and PHP payload execution.
Classification
Working Poc 100%
Target:
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
No auth needed
Prerequisites:
Target must have user registration enabled · Target must be running a vulnerable Drupal version
exploitdb
WORKING POC
VERIFIED
by Vitalii Rudnykh · pythonwebappsphp
https://www.exploit-db.com/exploits/44448
This exploit targets a Drupal RESTWS module vulnerability (CVE-2018-7600) to achieve remote code execution (RCE) by injecting malicious payloads via AJAX form manipulation. It writes a file ('hello.txt') to verify successful exploitation.
Classification
Working Poc 95%
Target:
Drupal with RESTWS module (versions prior to fix)
No auth needed
Prerequisites:
Target must be running vulnerable Drupal with RESTWS module · Network access to the target
exploitdb
WORKING POC
VERIFIED
by Hans Topo & g0tmi1k · rubywebappsphp
https://www.exploit-db.com/exploits/44449
This Ruby script exploits CVE-2018-7600 (Drupalgeddon2), a remote code execution vulnerability in Drupal. It leverages form API manipulation to inject malicious payloads via #post_render or #lazy_builder callbacks, achieving RCE on vulnerable Drupal installations.
Classification
Working Poc 95%
Target:
Drupal <= 8.5.0 / <= 8.4.5 / <= 8.3.8 / 7.23 <= 7.57
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · Access to the Drupal registration or user login form
github
WRITEUP
3,480 stars
by qazbnm456 · poc
https://github.com/qazbnm456/awesome-cve-poc/tree/master/CVE-2018-7600.md
This repository provides a curated list of references and external PoCs for CVE-2018-7600, a critical RCE vulnerability in Drupal. It includes links to technical analyses, exploit code, and advisory details but does not contain direct exploit code itself.
Classification
Writeup 90%
Target:
Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1
No auth needed
Prerequisites:
Vulnerable Drupal installation
nomisec
WORKING POC
593 stars
by dreadlocked · remote
https://github.com/dreadlocked/Drupalgeddon2
This repository contains a functional exploit for CVE-2018-7600, targeting Drupal versions 7.x and 8.x with remote code execution via the 'Drupalgeddon2' vulnerability. It supports both direct command execution and writing a PHP shell to the web root or subdirectories.
Classification
Working Poc 100%
Target:
Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 / < 7.58
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · Network access to the target's web interface
nomisec
WORKING POC
353 stars
by a2u · remote
https://github.com/a2u/CVE-2018-7600
This PoC exploits CVE-2018-7600 in Drupal by leveraging a vulnerability in form API handling to achieve remote code execution (RCE). It sends a crafted POST request to execute arbitrary commands via the 'mail[#post_render][]' parameter.
Classification
Working Poc 95%
Target:
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
No auth needed
Prerequisites:
Target running vulnerable Drupal version · Network access to the target
nomisec
WORKING POC
139 stars
by pimps · remote
https://github.com/pimps/CVE-2018-7600
This repository contains two Python scripts that exploit CVE-2018-7600 and CVE-2018-7602 in Drupal 7, allowing remote code execution by poisoning forms and triggering them via AJAX. The exploits are functional and demonstrate command execution on vulnerable systems.
Classification
Working Poc 100%
Target:
Drupal 7 <= 7.57 (CVE-2018-7600), Drupal 7 <= 7.58 (CVE-2018-7602)
No auth needed
Prerequisites:
Access to the target Drupal site · For CVE-2018-7602, valid user credentials are required
nomisec
WORKING POC
114 stars
by g0rx · remote
https://github.com/g0rx/CVE-2018-7600-Drupal-RCE
This repository contains multiple proof-of-concept exploits for CVE-2018-7600, a remote code execution vulnerability in Drupal 7 and 8. The exploits leverage Drupal's form API to execute arbitrary commands via crafted POST requests.
Classification
Working Poc 100%
Target:
Drupal 7.x < 7.58, Drupal 8.x < 8.3.9, Drupal 8.4.x < 8.4.6, Drupal 8.5.x < 8.5.1
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · Network access to the target
nomisec
WORKING POC
72 stars
by firefart · remote
https://github.com/firefart/CVE-2018-7600
This is a functional exploit for CVE-2018-7600, targeting Drupal 7.x unauthenticated RCE via form API manipulation. The PoC uses a two-step request process to trigger command execution via the 'passthru' function.
Classification
Working Poc 95%
Target:
Drupal < 7.58
No auth needed
Prerequisites:
Python 3 · requests library · target Drupal instance with vulnerable version
github
WRITEUP
14 stars
by xbl3 · poc
https://github.com/xbl3/awesome-cve-poc_qazbnm456/tree/master/CVE-2018-7600.md
This repository provides a curated list of references and external PoCs for CVE-2018-7600, a critical RCE vulnerability in Drupal. It includes links to technical analyses, exploit code, and advisory details but does not contain functional exploit code itself.
Classification
Writeup 90%
Target:
Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1
No auth needed
Prerequisites:
Vulnerable Drupal installation
nomisec
WORKING POC
11 stars
by lorddemon · remote
https://github.com/lorddemon/drupalgeddon2
This is a functional exploit for CVE-2018-7600, targeting Drupal's remote code execution vulnerability via form API manipulation. It sends crafted POST requests to execute arbitrary OS commands on vulnerable Drupal installations.
Classification
Working Poc 95%
Target:
Drupal 7.x and 8.x (prior to patches)
No auth needed
Prerequisites:
Vulnerable Drupal installation · Network access to the target
nomisec
WORKING POC
8 stars
by r3dxpl0it · remote
https://github.com/r3dxpl0it/CVE-2018-7600
This repository contains a Python script that exploits CVE-2018-7600, a remote code execution vulnerability in Drupal 7.x and 8.x. The script sends a malicious POST request to a target Drupal site to execute arbitrary commands and verify vulnerability by checking for a created file.
Classification
Working Poc 90%
Target:
Drupal 7.x and 8.x
No auth needed
Prerequisites:
Target running vulnerable Drupal version · Network access to the target
nomisec
WORKING POC
8 stars
by rabbitmask · remote
https://github.com/rabbitmask/CVE-2018-7600-Drupal7
This repository contains a working exploit PoC for CVE-2018-7600, a remote code execution vulnerability in Drupal 7. The exploit leverages form API manipulation to execute arbitrary commands via the `passthru` function.
Classification
Working Poc 95%
Target:
Drupal 7
No auth needed
Prerequisites:
Target Drupal 7 site with exposed user/password endpoint
nomisec
WORKING POC
8 stars
by zhzyker · remote
https://github.com/zhzyker/CVE-2018-7600-Drupal-POC-EXP
This is a Python-based exploit for CVE-2018-7600 (Drupalgeddon 2), which targets a remote code execution vulnerability in Drupal. The script sends a crafted POST request to execute arbitrary commands on vulnerable Drupal installations and retrieves output via a temporary file.
Classification
Working Poc 95%
Target:
Drupal 6.x, 7.x < 7.58, 8.3 < 8.3.9, 8.4 < 8.4.6, 8.5 < 8.5.1
No auth needed
Prerequisites:
Network access to the target Drupal instance · Drupal instance must be unpatched and vulnerable
nomisec
WORKING POC
7 stars
by thehappydinoa · remote
https://github.com/thehappydinoa/CVE-2018-7600
This repository contains a functional exploit for CVE-2018-7600, a Drupal remote code execution vulnerability. The exploit leverages the Drupal AJAX system to execute arbitrary commands by manipulating form inputs, specifically targeting the 'mail' field to inject and execute bash commands.
Classification
Working Poc 95%
Target:
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
No auth needed
Prerequisites:
Target running vulnerable Drupal version · Network access to the target
nomisec
WORKING POC
7 stars
by dr-iman · remote
https://github.com/dr-iman/CVE-2018-7600-Drupal-0day-RCE
This is a Perl script exploiting CVE-2018-7600, a remote code execution vulnerability in Drupal. It leverages the Drupal AJAX form API to inject malicious markup, leading to arbitrary command execution.
Classification
Working Poc 90%
Target:
Drupal CMS (versions prior to 7.58, 8.3.9, 8.4.6, 8.5.1)
No auth needed
Prerequisites:
Target running vulnerable Drupal version · Network access to the target
nomisec
WORKING POC
5 stars
by jirojo2 · poc
https://github.com/jirojo2/drupalgeddon2
This is a Metasploit module for CVE-2018-7600 (Drupalgeddon 2), which exploits a remote code execution vulnerability in Drupal versions before 7.58, 8.3.9, 8.4.6, and 8.5.1. The exploit leverages the user registration form to execute arbitrary PHP code via a crafted multipart form submission.
Classification
Working Poc 100%
Target:
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
No auth needed
Prerequisites:
Target must have the user registration form enabled · Target must be running a vulnerable version of Drupal
nomisec
WORKING POC
4 stars
by ludy-dev · remote
https://github.com/ludy-dev/drupal8-REST-RCE
This PoC exploits CVE-2018-7600 in Drupal 8 via REST API endpoints to achieve remote code execution (RCE). It sends crafted payloads to '/node/1' and '/user/register' endpoints to trigger deserialization vulnerabilities.
Classification
Working Poc 95%
Target:
Drupal 8
No auth needed
Prerequisites:
Drupal 8 instance with REST API enabled · Network access to the target
nomisec
WORKING POC
4 stars
by shellord · remote
https://github.com/shellord/CVE-2018-7600-Drupal-RCE
This is a Python-based mass exploiter for CVE-2018-7600, targeting Drupal 7 and 8 remote code execution vulnerabilities. It uses asynchronous HTTP requests to test and exploit multiple targets concurrently.
Classification
Working Poc 95%
Target:
Drupal 7.x and 8.x
No auth needed
Prerequisites:
List of target URLs · Python 3.x with aiohttp and BeautifulSoup libraries
nomisec
WORKING POC
4 stars
by sl4cky · remote
https://github.com/sl4cky/CVE-2018-7600
This is a functional exploit for CVE-2018-7600 (Drupalgeddon 2), which allows remote code execution on vulnerable Drupal installations via a crafted POST request to the user registration endpoint. The script includes both a test mode to verify vulnerability and an exploitation mode to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Drupal (versions 7.x, 8.x prior to 8.3.9, 8.4.x prior to 8.4.6, 8.5.x prior to 8.5.1)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · Network access to the target's web interface
nomisec
WORKING POC
4 stars
by dwisiswant0 · remote
https://github.com/dwisiswant0/CVE-2018-7600
This is a functional exploit for CVE-2018-7600 (Drupalgeddon 2), targeting a remote code execution vulnerability in Drupal. It leverages the vulnerability to execute arbitrary commands via a crafted POST request to the user registration endpoint.
Classification
Working Poc 95%
Target:
Drupal Core < 7.58, 8.3.9, 8.4.6, 8.5.1
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · Target must have the user registration endpoint accessible
nomisec
WORKING POC
3 stars
by knqyf263 · remote
https://github.com/knqyf263/CVE-2018-7600
This PoC exploits CVE-2018-7600, a Drupal remote code execution vulnerability via AJAX form manipulation. It sends a crafted payload to execute arbitrary commands (e.g., writing a file) without authentication.
Classification
Working Poc 95%
Target:
Drupal 7.x and 8.x
No auth needed
Prerequisites:
Target Drupal site with vulnerable version · Network access to the target
nomisec
SCANNER
3 stars
by sl4cky · remote
https://github.com/sl4cky/CVE-2018-7600-Masschecker
This repository contains a Python-based mass vulnerability scanner for CVE-2018-7600 (Drupalgeddon 2), which checks multiple URLs for the presence of the vulnerability by sending a crafted POST request to exploit the Drupal REST API endpoint. It does not execute a full exploit but confirms vulnerability by checking the response status code.
Classification
Scanner 95%
Target:
Drupal 7.x, 8.x (prior to patches for SA-CORE-2018-002)
No auth needed
Prerequisites:
List of target URLs in a file
github
WORKING POC
2 stars
by dark-vex · pythonpoc
https://github.com/dark-vex/CVE-PoC-collection/tree/master/CVE-2018-7600-Drupalgeddon2
This repository contains functional exploit code for CVE-2018-7600 (Drupalgeddon2), demonstrating remote code execution (RCE) in vulnerable Drupal versions. The exploit targets Drupal 7.x and 8.x via form API manipulation and the #post_render parameter, supporting both direct command execution and PHP shell deployment.
Classification
Working Poc 100%
Target:
Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 / < 7.58
No auth needed
Prerequisites:
vulnerable Drupal installation · access to user/register or user/password endpoints
nomisec
SCANNER
2 stars
by Hestat · poc
https://github.com/Hestat/drupal-check
This repository contains a bash script designed to scan Apache logs for indicators of compromise (IOCs) related to CVE-2018-7600 (Drupalgedon2). It searches for specific patterns associated with exploitation attempts and known malicious IPs.
Classification
Scanner 95%
Target:
Drupal (versions affected by CVE-2018-7600)
No auth needed
Prerequisites:
Access to Apache logs (either CPanel or default Apache configurations)
nomisec
WORKING POC
1 stars
by muhammedkayag · remote
https://github.com/muhammedkayag/CVE-2018-7600
This Python3 script exploits CVE-2018-7600 (Drupalgeddon2), a critical RCE vulnerability in Drupal 7.x and 8.x. It sends a crafted POST request to the `/user/register` endpoint to execute arbitrary commands, including a reverse shell payload.
Classification
Working Poc 100%
Target:
Drupal 7.x and 8.x (pre-patched versions)
No auth needed
Prerequisites:
Python3 · requests library · termcolor library · vulnerable Drupal instance
github
WORKING POC
1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2018-7600
This Perl script exploits CVE-2018-7600, a Drupal remote code execution vulnerability, by sending crafted POST requests to vulnerable endpoints. It includes multiple payload variations to trigger command execution via Drupal's form API.
Classification
Working Poc 95%
Target:
Drupal 7.x and 8.x
No auth needed
Prerequisites:
target URL · command to execute
nomisec
WORKING POC
1 stars
by 0xAJ2K · remote
https://github.com/0xAJ2K/CVE-2018-7600
This is a functional exploit for CVE-2018-7600, targeting Drupal 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1. It leverages a remote code execution vulnerability via crafted form input to execute arbitrary commands on the target system.
Classification
Working Poc 100%
Target:
Drupal 8.x (before 8.3.9, 8.4.6, 8.5.1)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal 8.x · Network access to the Drupal application
nomisec
WORKING POC
1 stars
by shellord · remote
https://github.com/shellord/Drupalgeddon-Mass-Exploiter
This repository contains a mass exploiter for CVE-2018-7600 and CVE-2018-7602, targeting Drupal 7 and 8. It automates the exploitation process by sending crafted HTTP requests to execute arbitrary commands on vulnerable systems.
Classification
Working Poc 95%
Target:
Drupal 7 and 8
No auth needed
Prerequisites:
List of target URLs · Python 3 environment with required libraries (aiohttp, BeautifulSoup, colorama)
nomisec
WORKING POC
1 stars
by drugeddon · remote
https://github.com/drugeddon/drupal-exploit
This exploit targets CVE-2018-7600, a remote code execution vulnerability in Drupal 7 and 8. It leverages form API manipulation to inject and execute arbitrary commands via the password recovery and file upload mechanisms.
Classification
Working Poc 95%
Target:
Drupal 7 <= 7.57 and Drupal 8
No auth needed
Prerequisites:
Access to the Drupal password recovery or registration form · Network access to the target Drupal instance
nomisec
WORKING POC
1 stars
by Damian972 · poc
https://github.com/Damian972/drupalgeddon-2
This is a functional exploit PoC for CVE-2018-7600 (Drupalgeddon 2), targeting Drupal 7.x and 8.x. It checks for vulnerability by executing a benign command ('echo GOOD') via remote code execution (RCE) through crafted HTTP requests.
Classification
Working Poc 95%
Target:
Drupal 7.x and 8.x
No auth needed
Prerequisites:
Target must be running vulnerable Drupal 7.x or 8.x · Network access to the target
nomisec
WORKING POC
by Meraj1312 · poc
https://github.com/Meraj1312/cve-2018-7600-drupalgeddon2-lab
This repository provides a functional exploit PoC for CVE-2018-7600 (Drupalgeddon2) targeting Drupal 7.56, including a Docker-based lab environment for testing. The exploit leverages a vulnerability in Drupal's Form API to achieve unauthenticated remote code execution.
Classification
Working Poc 95%
Target:
Drupal 7.56
No auth needed
Prerequisites:
Docker · Docker Compose · vulnerable Drupal 7.56 instance
gitlab
WORKING POC
by SeppPenner · remote
https://gitlab.com/SeppPenner/CVE-2018-7600
The repository contains a functional exploit for CVE-2018-7600, a remote code execution vulnerability in Drupal. The exploit leverages improper input sanitization in form API to execute arbitrary commands via crafted POST requests.
Classification
Working Poc 95%
Target:
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
No auth needed
Prerequisites:
Target running vulnerable Drupal version · Access to the user registration endpoint
gitlab
WORKING POC
by thehappydinoa · remote
https://gitlab.com/thehappydinoa/CVE-2018-7600
This repository contains a functional Python exploit for CVE-2018-7600, a remote code execution vulnerability in Drupal. The exploit leverages the Drupal AJAX system to inject arbitrary commands via the 'exec' markup, demonstrating the vulnerability by creating a file with user and group information.
Classification
Working Poc 95%
Target:
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
No auth needed
Prerequisites:
Target running vulnerable Drupal version · Network access to the target
nomisec
WRITEUP
by tea-celikik · poc
https://github.com/tea-celikik/Drupal-Exploit-Lab
This repository is a writeup demonstrating the exploitation of CVE-2018-7600 (Drupalgeddon2) on Drupal 7.57, comparing unprotected and WAF-protected scenarios using Metasploit. It does not contain exploit code but describes the setup and tools used for exploitation.
Classification
Writeup 100%
Target:
Drupal 7.57
No auth needed
Prerequisites:
Vulnerable Drupal 7.57 instance · Metasploit Framework · Network access to target
nomisec
WORKING POC
by bixiPRO · remote
https://github.com/bixiPRO/Drupalgeddon2-CVE-2018-7600
This repository contains a functional Python exploit for CVE-2018-7600 (Drupalgeddon 2), targeting Drupal 7. It automates remote command execution by leveraging Drupal's form API to inject and execute arbitrary commands via multiple PHP functions.
Classification
Working Poc 95%
Target:
Drupal 7
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal 7 · Network access to the target Drupal instance
nomisec
SCANNER
by 4l13n-DN · remote
https://github.com/4l13n-DN/POC-CVE-2018-7600
This is a Python-based scanner for detecting Drupal installations vulnerable to CVE-2018-7600 (Drupalgeddon2). It sends two HTTP requests to check for vulnerability indicators but does not exploit the vulnerability or execute payloads.
Classification
Scanner 100%
Target:
Drupal (versions affected by CVE-2018-7600)
No auth needed
Prerequisites:
Network access to the target Drupal instance
nomisec
WORKING POC
by M-Abid34 · remote
https://github.com/M-Abid34/CVE-2018-7600
This is a Python-based exploit for CVE-2018-7600 (Drupalgeddon 2), a critical RCE vulnerability in Drupal. It leverages form manipulation and AJAX endpoint abuse to execute arbitrary commands on unpatched Drupal installations.
Classification
Working Poc 95%
Target:
Drupal 6.x, 7.x, 8.x (pre-patch)
No auth needed
Prerequisites:
Target Drupal instance with vulnerable version · Network access to the target
nomisec
WORKING POC
by nika0x38 · remote
https://github.com/nika0x38/CVE-2018-7600
This Rust-based PoC exploits CVE-2018-7600 in Drupal 7 by poisoning a cached form with a malicious renderable array and triggering remote code execution via the file/ajax endpoint. It automates the two-step attack (poison and trigger) and supports custom commands and PHP functions.
Classification
Working Poc 100%
Target:
Drupal 7 <= 7.57
No auth needed
Prerequisites:
Vulnerable Drupal 7 installation · Network access to the target
nomisec
WORKING POC
by SyedGhufranRaza · remote
https://github.com/SyedGhufranRaza/CVE-2018-7600-Remote-Code-Execution
This repository contains a Python-based proof-of-concept exploit for CVE-2018-7600, a remote code execution vulnerability in Drupal. The exploit leverages insufficient sanitization in form API AJAX requests to execute arbitrary commands on vulnerable Drupal instances.
Classification
Working Poc 95%
Target:
Drupal Core 7.x < 7.58, 8.3.x < 8.3.9, 8.4.x < 8.4.6, 8.5.x < 8.5.1
No auth needed
Prerequisites:
Python 3.x · requests library · colorama library · target running vulnerable Drupal version
nomisec
WORKING POC
by xxxTectationxxx · remote
https://github.com/xxxTectationxxx/CVE-2018-7600
This is a functional exploit for CVE-2018-7600 (Drupalgeddon2), targeting Drupal 7.x to achieve unauthenticated remote code execution via form manipulation and passthru() injection.
Classification
Working Poc 95%
Target:
Drupal 7.x (including 7.56)
No auth needed
Prerequisites:
Target running unpatched Drupal 7.x · Network access to the target
nomisec
WORKING POC
by rajaabdullahnasir · poc
https://github.com/rajaabdullahnasir/CVE-2018-7600-Remote-Code-Execution
This repository contains a Python-based proof-of-concept exploit for CVE-2018-7600 (Drupalgeddon2), a remote code execution vulnerability in Drupal. The script includes features for vulnerability checking, multithreading, and command execution on vulnerable Drupal instances.
Classification
Working Poc 95%
Target:
Drupal Core 7.x (before 7.58), 8.3.x (before 8.3.9), 8.4.x (before 8.4.6), 8.5.x (before 8.5.1)
No auth needed
Prerequisites:
Python 3.x · requests library · colorama library · target running vulnerable Drupal version
nomisec
WORKING POC
by Dowonkwon · remote
https://github.com/Dowonkwon/drupal-cve-2018-7600-poc
This repository provides a proof-of-concept exploit for CVE-2018-7600 (Drupalgeddon 2), an unauthenticated remote code execution vulnerability in Drupal. It includes instructions for setting up a vulnerable environment using Docker and demonstrates the exploit via a crafted HTTP POST request.
Classification
Working Poc 95%
Target:
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
No auth needed
Prerequisites:
Drupal instance with vulnerable version · Network access to the target
nomisec
WORKING POC
by tpdlshdmlrkfmcla · poc
https://github.com/tpdlshdmlrkfmcla/CVE-2018-7600.
This repository contains a Python-based exploit for CVE-2018-7600, a remote code execution vulnerability in Drupal 7.x and 8.x. The script sends a malicious POST request to trigger the vulnerability and checks for a file created by the exploit to confirm success.
Classification
Working Poc 90%
Target:
Drupal 7.x and 8.x
No auth needed
Prerequisites:
Target URL · Network access to the target
github
WORKING POC
by dugisan3rd · pythonpoc
https://github.com/dugisan3rd/exploit/tree/main/cve-2018-7600
This repository contains a functional Python exploit for CVE-2018-7600, a blind RCE vulnerability in Drupal. The exploit leverages the Drupal form API to inject and execute arbitrary commands via crafted POST requests.
Classification
Working Poc 95%
Target:
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
No auth needed
Prerequisites:
Target Drupal instance with vulnerable version · Network access to the target
nomisec
WORKING POC
by raytran54 · poc
https://github.com/raytran54/CVE-2018-7600
This repository contains a functional exploit for CVE-2018-7600, a Drupal remote code execution vulnerability. The exploit leverages the Form API's Ajax endpoint to inject malicious payloads via the #post_render key, allowing arbitrary command execution on vulnerable Drupal installations.
Classification
Working Poc 95%
Target:
Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
No auth needed
Prerequisites:
Target running vulnerable Drupal version · Network access to the Drupal server
nomisec
WORKING POC
by r0lh · remote
https://github.com/r0lh/CVE-2018-7600
This is a functional proof-of-concept exploit for CVE-2018-7600, a remote code execution vulnerability in Drupal. It leverages the Drupal AJAX form API to execute arbitrary commands via a pseudo-shell interface.
Classification
Working Poc 95%
Target:
Drupal (versions 7.x, 8.x prior to 8.5.1, 8.3.x prior to 8.3.9, 8.4.x prior to 8.4.6)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · Network access to the target Drupal site
nomisec
WORKING POC
by anldori · remote
https://github.com/anldori/CVE-2018-7600
This is a functional exploit for CVE-2018-7600, targeting Drupal's remote code execution vulnerability via form API manipulation. The PoC sends a crafted POST request to execute arbitrary commands (e.g., writing a file) and verifies success by checking the created file.
Classification
Working Poc 95%
Target:
Drupal 7.x and 8.x (prior to patches)
No auth needed
Prerequisites:
Target must be running vulnerable Drupal version · Network access to the target
github
WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2018-7600
This Perl script exploits CVE-2018-7600, a Drupal remote code execution vulnerability, by sending crafted POST requests to vulnerable endpoints. It includes multiple payload variations to trigger command execution via Drupal's form API.
Classification
Working Poc 95%
Target:
Drupal 7.x and 8.x
No auth needed
Prerequisites:
target URL · command to execute
nomisec
SCANNER
by vphnguyen · poc
https://github.com/vphnguyen/ANM_CVE-2018-7600
This script is a network sniffer that detects exploitation attempts of CVE-2018-7600 (Drupalgeddon2) by monitoring HTTP traffic for specific patterns indicative of the vulnerability. It also logs FTP brute force attempts and other network traffic details to a CSV file.
Classification
Scanner 90%
Target:
Drupal < 7.58, < 8.3.9, < 8.4.6, < 8.5.1
No auth needed
Prerequisites:
Network access to monitor traffic · Python with pyshark and psutil libraries
nomisec
WORKING POC
by rafaelcaria · remote
https://github.com/rafaelcaria/drupalgeddon2-CVE-2018-7600
This is a functional exploit for CVE-2018-7600 (Drupalgeddon2), which leverages a property injection vulnerability in Drupal's Forms API to achieve remote code execution. The script allows testing for vulnerability and executing arbitrary commands via configurable PHP functions like passthru.
Classification
Working Poc 100%
Target:
Drupal 6.x, < 7.58, 8.2.x, < 8.3.9, < 8.4.6, and < 8.5.1
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · Network access to the Drupal application
nomisec
WRITEUP
by cved-sources · poc
https://github.com/cved-sources/cve-2018-7600
This repository is a README file referencing a Docker container for CVE-2018-7600, a Drupal remote code execution vulnerability. It does not contain exploit code but points to external sources for vulnerable environments.
Classification
Writeup 90%
Target:
Drupal < 7.58, < 8.5.1, < 8.3.9, < 8.4.6
No auth needed
Prerequisites:
Access to a vulnerable Drupal instance
nomisec
STUB
by madneal · poc
https://github.com/madneal/codeql-scanner
The repository contains only a README.md file referencing an exploit for CVE-2018-7600 (Drupalgeddon2) but lacks any actual exploit code or implementation details.
Target:
Drupal < 7.58, < 8.3.9, < 8.4.6, < 8.5.1
No auth needed
Prerequisites:
Drupal instance vulnerable to CVE-2018-7600
nomisec
WORKING POC
by ruthvikvegunta · remote
https://github.com/ruthvikvegunta/Drupalgeddon2
This repository contains a functional exploit for CVE-2018-7600 (Drupalgeddon2), targeting Drupal versions < 7.58, < 8.3.9, < 8.4.6, and < 8.5.1. The exploit leverages the #post_render and #lazy_builder parameters to achieve remote code execution (RCE) via PHP's exec function.
Classification
Working Poc 95%
Target:
Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1
No auth needed
Prerequisites:
Network access to the target Drupal instance · Drupal instance with vulnerable version
nomisec
WORKING POC
by ynsmroztas · remote
https://github.com/ynsmroztas/drupalhunter
This is a functional exploit for CVE-2018-7600 (Drupalgeddon2), leveraging a remote code execution vulnerability in Drupal via malicious form input manipulation. The script sends crafted POST requests to trigger arbitrary command execution on vulnerable Drupal installations.
Classification
Working Poc 95%
Target:
Drupal < 7.58, < 8.3.9, < 8.4.6, < 8.5.1
No auth needed
Prerequisites:
Target URL · Vulnerable Drupal version · Network access to the target
nomisec
WORKING POC
by happynote3966 · remote
https://github.com/happynote3966/CVE-2018-7600
This repository contains multiple proof-of-concept exploits for CVE-2018-7600, a remote code execution vulnerability in Drupal. The exploits target Drupal versions 7.x, 8.x, and 6.x, leveraging the `#post_render` parameter to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 / < 7.58 / < 6.x
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · Network access to the target
nomisec
WORKING POC
by soch4n · poc
https://github.com/soch4n/CVE-2018-7600
This PoC exploits CVE-2018-7600, a Drupal RESTful Web Services (REST) module vulnerability, by sending a crafted AJAX request to execute arbitrary commands via the lazy_builder system. The exploit demonstrates command injection by executing 'ls -la'.
Classification
Working Poc 95%
Target:
Drupal 7.x and 8.x (with RESTful Web Services enabled)
No auth needed
Prerequisites:
Drupal instance with RESTful Web Services enabled · Network access to the target server
vulncheck_xdb
WORKING POC
remote
https://github.com/user20252228/CVE-2018-7600.
The repository contains a functional Python exploit for CVE-2018-7600, a remote code execution vulnerability in Drupal 7.x and 8.x. The script sends a crafted POST request to trigger the vulnerability and checks for a file created by the payload to confirm exploitation.
Classification
Working Poc 90%
Target:
Drupal 7.x and 8.x
No auth needed
Prerequisites:
Target URL · Network access to the target
vulncheck_xdb
SCANNER
remote
https://github.com/SecPentester/CVE-7600-2018
The repository contains a Python script that scans for CVE-2018-7600, a Drupal remote code execution vulnerability, by attempting to write a file to the target system. It does not execute arbitrary commands but checks for vulnerability by verifying the presence of a created file.
Classification
Scanner 90%
Target:
Drupal (versions 7.x and 8.x prior to patches)
No auth needed
Prerequisites:
Target URL with vulnerable Drupal instance
vulncheck_xdb
SCANNER
remote
https://github.com/1AmG0d/myDrupal
The repository contains a Python script that scans for Drupal versions and checks vulnerability status against CVE-2018-7600 and CVE-2018-7602. It does not include exploit code but identifies potentially vulnerable versions.
Classification
Scanner 95%
Target:
Drupal 6.x, 7.x, 8.x
No auth needed
Prerequisites:
network access to target Drupal site
metasploit
WORKING POC
EXCELLENT
by Jasper Mattsson, a2u, Nixawk, FireFart, wvu · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/drupal_drupalgeddon2.rb
This Metasploit module exploits CVE-2018-7600, a property injection vulnerability in Drupal's Forms API, allowing remote code execution on unpatched Drupal installations. It supports multiple targets, including Drupal 7.x and 8.x, with various payload delivery methods.
Classification
Working Poc 100%
Target:
Drupal 6.x, < 7.58, 8.2.x, < 8.3.9, < 8.4.6, and < 8.5.1
No auth needed
Prerequisites:
Unpatched Drupal installation · Network access to the target