Arbitrary File Upload Affecting drupal/drupal package, versions <8.7.11>=8.8.0, <8.8.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary File Upload vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-DRUPALDRUPAL-538568
  • published22 Dec 2019
  • disclosed18 Dec 2019
  • creditRohit Kapur, Filipe Reis, Dan Reif, mramydnei

Introduced: 18 Dec 2019

CVE NOT AVAILABLE CWE-434  (opens in a new tab)

How to fix?

Upgrade drupal/drupal to version 8.7.11, 8.8.1 or higher.

Overview

drupal/drupal is an open source content management platform powering millions of websites and applications.

Affected versions of this package are vulnerable to Arbitrary File Upload via the file_save_upload() function. It does not strip the leading and trailing dot ('.') from filenames, like Drupal 7 did. Users with the ability to upload files with any extension in conjunction with contributed modules may be able to use this to upload system files such as .htaccess in order to bypass protections afforded by Drupal's default .htaccess file.

CVSS Scores

version 3.1