CVE-2019-6339
CRITICALDrupal < 7.62 - Improper Input Validation
Title source: ruleDescription
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
Exploits (1)
nomisec
WORKING POC
6 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/drupal-cve-2019-6339
Scores
CVSS v3
9.8
EPSS
0.7609
EPSS Percentile
98.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-20
Status
published
Products (5)
debian/debian_linux
8.0
debian/debian_linux
9.0
drupal/core
7.0.0 - 7.62.0Packagist
drupal/drupal
7.0 - 7.62
drupal/drupal
7.0.0 - 7.62.0Packagist
Published
Jan 22, 2019
Tracked Since
Feb 18, 2026