CVE-2019-6340

KEV
Published: Feb 21, 2019 Last Modified: Nov 07, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,1
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM 6,8
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial

Description

AI Translation Available

Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9444
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

502

Deserialization of Untrusted Data

Draft
Common Consequences
Security Scopes Affected:
Integrity Availability Other
Potential Impacts:
Modify Application Data Unexpected State Dos: Resource Consumption (Cpu) Varies By Context
Applicable Platforms
Languages: Java, JavaScript, PHP, Python, Ruby
Technologies: AI/ML, ICS/OT, Not Technology-Specific
View CWE Details
Exploit

Drupal < 8.6.10 / < 8.5.11 - REST …

Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution

View Exploit Code →
Exploit

Drupal < 8.6.9 - REST Module Remote Code …

Drupal < 8.6.9 - REST Module Remote Code Execution

View Exploit Code →
Exploit

Drupal < 8.5.11 / < 8.6.10 - RESTful …

Verified Remote

Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)

View Exploit Code →
Application

Drupal by Drupal

Version Range Affected
From 8.6.0 (inclusive)
To 8.6.10 (exclusive)
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Drupal by Drupal

Version Range Affected
From 8.5.0 (inclusive)
To 8.5.11 (exclusive)
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019…
https://www.drupal.org/sa-core-2019-003
https://www.exploit-db.com/exploits/46452/
https://www.exploit-db.com/exploits/46459/
https://www.exploit-db.com/exploits/46510/
https://www.synology.com/security/advisory/Synology_SA_19_09
http://www.securityfocus.com/bid/107106
https://www.drupal.org/sa-core-2019-003
https://www.exploit-db.com/exploits/46452/
https://www.exploit-db.com/exploits/46459/
https://www.exploit-db.com/exploits/46510/
https://www.synology.com/security/advisory/Synology_SA_19_09
http://www.securityfocus.com/bid/107106