CVE-2019-6340

HIGH KEV NUCLEI

Drupal < 8.5.11 - Insecure Deserialization

Title source: rule

Description

Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)

Exploits (16)

nomisec WORKING POC 71 stars
by jas502n · remote
https://github.com/jas502n/CVE-2019-6340
nomisec WORKING POC 42 stars
by knqyf263 · remote
https://github.com/knqyf263/CVE-2019-6340
nomisec WORKING POC 32 stars
by g0rx · poc
https://github.com/g0rx/Drupal-SA-CORE-2019-003
nomisec WORKING POC 12 stars
by oways · poc
https://github.com/oways/CVE-2019-6340
nomisec WORKING POC 4 stars
by ludy-dev · remote
https://github.com/ludy-dev/drupal8-REST-RCE
nomisec WORKING POC 2 stars
by DevDungeon · poc
https://github.com/DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass
github WORKING POC 1 stars
by vaishakhcv · perlpoc
https://github.com/vaishakhcv/CVE-exploits/tree/master/CVE-2019-6340
github WORKING POC
by winterwolf32 · perlpoc
https://github.com/winterwolf32/CVE_Exploits-/tree/master/CVE-2019-6340
nomisec WORKING POC
by nobodyatall648 · remote
https://github.com/nobodyatall648/CVE-2019-6340
nomisec WORKING POC
by Sumitpathania03 · remote
https://github.com/Sumitpathania03/Drupal-cve-2019-6340
nomisec STUB
by cved-sources · poc
https://github.com/cved-sources/cve-2019-6340
nomisec WRITEUP
by josehelps · poc
https://github.com/josehelps/cve-2019-6340-bits
exploitdb WORKING POC
by Charles Fol · textwebappsphp
https://www.exploit-db.com/exploits/46452
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotephp
https://www.exploit-db.com/exploits/46510
exploitdb WORKING POC
by leonjza · pythonwebappsphp
https://www.exploit-db.com/exploits/46459
metasploit WORKING POC NORMAL
by Jasper Mattsson, Charles Fol, Rotem Reiss, wvu · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/drupal_restws_unserialize.rb

Nuclei Templates (1)

Drupal - Remote Code Execution
HIGHby madrobot
Shodan: http.component:"drupal" || cpe:"cpe:2.3:a:drupal:drupal"

Scores

CVSS v3 8.1
EPSS 0.9444
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-03-25
VulnCheck KEV 2019-12-27
InTheWild.io 2019-02-25
ENISA EUVD EUVD-2022-2184

Classification

CWE
CWE-502
Status published

Affected Products (3)

drupal/drupal < 8.5.11
drupal/core < 8.6.10Packagist
drupal/drupal < 7.62.0Packagist

Timeline

Published Feb 21, 2019
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026