Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2017-6381

Disclosure Date: March 16, 2017
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A 3rd party development library including with Drupal 8 development dependencies is vulnerable to remote code execution. This is mitigated by the default .htaccess protection against PHP execution, and the fact that Composer development dependencies aren’t normal installed. You might be vulnerable to this if you are running a version of Drupal before 8.2.2. To be sure you aren’t vulnerable, you can remove the <siteroot>/vendor/phpunit directory from your production deployments

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
8.1 High
Impact Score:
5.9
Exploitability Score:
2.2
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • drupal

Products

  • drupal 8.0.0,
  • drupal 8.0.1,
  • drupal 8.0.2,
  • drupal 8.0.3,
  • drupal 8.0.4,
  • drupal 8.0.5,
  • drupal 8.0.6,
  • drupal 8.1.0,
  • drupal 8.1.1,
  • drupal 8.1.10,
  • drupal 8.1.2,
  • drupal 8.1.3,
  • drupal 8.1.4,
  • drupal 8.1.5,
  • drupal 8.1.6,
  • drupal 8.1.7,
  • drupal 8.1.8,
  • drupal 8.1.9,
  • drupal 8.2.0,
  • drupal 8.2.1

Additional Info

Technical Analysis