CVE-2020-13671

Published Nov 20, 2020

Last updated 4 months ago

Overview

Description
Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.
Source
mlhess@drupal.org
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
6.5
Impact score
6.4
Exploitability score
8
Vector string
AV:N/AC:L/Au:S/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
Drupal core Un-restricted Upload of File
Exploit added on
Jan 18, 2022
Exploit action due
Jul 18, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-434

Social media

Hype score
Not currently trending

Configurations