nomisec
WORKING POC
71 stars
by jas502n · remote
https://github.com/jas502n/CVE-2019-6340
This repository contains a functional exploit for CVE-2019-6340, a remote code execution vulnerability in Drupal 8's REST API. The exploit leverages deserialization to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Drupal 8
No auth needed
Prerequisites:
Drupal 8 installation with REST API enabled
nomisec
WORKING POC
42 stars
by knqyf263 · remote
https://github.com/knqyf263/CVE-2019-6340
This repository contains a working proof-of-concept exploit for CVE-2019-6340, a deserialization vulnerability in Drupal 8. The exploit leverages a crafted payload to achieve remote code execution (RCE) via the GuzzleHttp library.
Classification
Working Poc 95%
Target:
Drupal 8
No auth needed
Prerequisites:
Drupal 8 installation with RESTful Web Services enabled
nomisec
WORKING POC
32 stars
by g0rx · poc
https://github.com/g0rx/Drupal-SA-CORE-2019-003
This is a functional exploit for CVE-2019-6340, targeting Drupal 8's REST services to achieve unauthenticated remote code execution via deserialization gadgets in the Guzzle HTTP client library. The PoC automates node discovery, vulnerability checking, and command execution.
Classification
Working Poc 100%
Target:
Drupal 8.x (up to 8.6.9)
No auth needed
Prerequisites:
RESTful Web Services module enabled · Access to a vulnerable Drupal endpoint
nomisec
WORKING POC
12 stars
by oways · poc
https://github.com/oways/CVE-2019-6340
This PoC exploits a deserialization vulnerability in Drupal (CVE-2019-6340) to achieve remote code execution by crafting a malicious JSON payload with a GuzzleHttp object. The exploit leverages the REST API to trigger the payload, executing arbitrary PHP functions.
Classification
Working Poc 95%
Target:
Drupal 8.6.x (prior to 8.6.10)
No auth needed
Prerequisites:
Target must have REST API enabled · Target must be vulnerable to deserialization
nomisec
WORKING POC
4 stars
by ludy-dev · remote
https://github.com/ludy-dev/drupal8-REST-RCE
This PoC exploits CVE-2018-7600 in Drupal 8 via REST API endpoints to achieve remote code execution (RCE). It sends crafted payloads to '/node/1' and '/user/register' endpoints to trigger deserialization vulnerabilities.
Classification
Working Poc 95%
Target:
Drupal 8
No auth needed
Prerequisites:
Drupal 8 instance with REST API enabled · Network access to the target
nomisec
WORKING POC
2 stars
by DevDungeon · poc
https://github.com/DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass
This repository contains a working exploit for CVE-2019-6340, a Drupal RESTful Web Services authentication bypass leading to remote code execution via deserialization. The exploit leverages a crafted payload to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Drupal 8.6.9
No auth needed
Prerequisites:
RESTful Web Services module enabled · HAL module enabled · HTTP Basic Authentication module enabled · Serialization module enabled
github
WORKING POC
1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2019-6340
This repository contains a functional Perl exploit for CVE-2019-6340, targeting Drupal 8's REST module RCE vulnerability. The exploit leverages deserialization via crafted JSON payloads to achieve remote code execution.
Classification
Working Poc 95%
Target:
Drupal 8 (with REST module enabled)
No auth needed
Prerequisites:
Drupal 8 with REST module enabled · network access to the target
github
WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2019-6340
This repository contains a functional Perl exploit for CVE-2019-6340, a deserialization vulnerability in Drupal 8's REST module. The exploit crafts a malicious payload to achieve remote code execution (RCE) by leveraging the insecure deserialization of user-supplied data.
Classification
Working Poc 95%
Target:
Drupal 8 (with REST module enabled)
No auth needed
Prerequisites:
Drupal 8 with REST module enabled · Network access to the target
nomisec
WORKING POC
by nobodyatall648 · remote
https://github.com/nobodyatall648/CVE-2019-6340
This exploit leverages a deserialization vulnerability in Drupal 8.6.x (CVE-2019-6340) via the RESTful Web Services module to achieve remote code execution. It crafts a malicious payload using GuzzleHttp's FnStream and HandlerStack classes to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Drupal 8.6.x < 8.6.10 or Drupal < 8.5.11
No auth needed
Prerequisites:
RESTful Web Services module enabled · Drupal 8.6.x < 8.6.10 or Drupal < 8.5.11
nomisec
WORKING POC
by Sumitpathania03 · remote
https://github.com/Sumitpathania03/Drupal-cve-2019-6340
This is a functional exploit for CVE-2019-6340, targeting Drupal 8's RESTful API module. It leverages deserialization via Guzzle HTTP client gadgets to achieve unauthenticated remote code execution (RCE).
Classification
Working Poc 95%
Target:
Drupal 8.6.9 (with RESTful API module enabled)
No auth needed
Prerequisites:
Drupal 8 with RESTful API module enabled · At least one existing node/content on the target site · No caching or cache bypass required
nomisec
STUB
by cved-sources · poc
https://github.com/cved-sources/cve-2019-6340
The repository contains only a README and a Drupal settings.php file, with no actual exploit code or proof-of-concept. It appears to be part of a vulnerable container management tool (Cved) but lacks functional exploit details.
Target:
Drupal
No auth needed
Prerequisites:
Drupal installation
nomisec
WRITEUP
by josehelps · poc
https://github.com/josehelps/cve-2019-6340-bits
This repository contains analysis artifacts and an example playbook for CVE-2019-6340, a Drupal RESTful RCE vulnerability. The playbook is a Phantom SOAR automation script for incident response, not an exploit.
Classification
Writeup 90%
Target:
Drupal
No auth needed
Prerequisites:
Phantom SOAR platform · AWS integration for blacklisting/quarantine
exploitdb
WORKING POC
by Charles Fol · textwebappsphp
https://www.exploit-db.com/exploits/46452
This exploit leverages a deserialization vulnerability in Drupal 8.6.9's REST module by sending a crafted HAL+JSON request with a serialized payload to achieve remote code execution (RCE). The payload is generated using PHPGGC to exploit Guzzle's deserialization behavior.
Classification
Working Poc 100%
Target:
Drupal 8.6.9
No auth needed
Prerequisites:
Drupal 8.6.9 with REST module enabled · Access to the Drupal REST endpoint
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/46510
This Metasploit module exploits a PHP unserialize() vulnerability in Drupal RESTful Web Services (CVE-2019-6340) by sending a crafted request to the /node REST endpoint. It supports multiple HTTP methods (GET, POST, PATCH, PUT) and includes checks for vulnerability and patch status.
Classification
Working Poc 100%
Target:
Drupal < 8.5.11 and < 8.6.10
No auth needed
Prerequisites:
Drupal RESTful Web Services module enabled · Access to the /node REST endpoint
exploitdb
WORKING POC
by leonjza · pythonwebappsphp
https://www.exploit-db.com/exploits/46459
This exploit leverages a deserialization vulnerability in Drupal's REST services to achieve unauthenticated remote code execution. It uses Guzzle gadgets to execute arbitrary commands on the target system.
Classification
Working Poc 100%
Target:
Drupal <= 8.6.9
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · REST services must be enabled
metasploit
WORKING POC
NORMAL
by Jasper Mattsson, Charles Fol, Rotem Reiss, wvu · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/drupal_restws_unserialize.rb
This Metasploit module exploits a PHP unserialize() vulnerability in Drupal RESTful Web Services (CVE-2019-6340) by sending a crafted request to the /node REST endpoint. It supports multiple HTTP methods (GET, POST, PATCH, PUT) and leverages PHP object injection via GuzzleHttp to achieve remote code execution.
Classification
Working Poc 100%
Target:
Drupal < 8.5.11 and < 8.6.10
No auth needed
Prerequisites:
Drupal RESTful Web Services modules enabled · Access to the /node REST endpoint