Plattform
drupal
Komponente
drupal
Behoben in
9.3.19
9.4.3
CVE-2022-25277 affects Drupal Core, specifically the handling of filenames during uploads. While Drupal Core includes protections against uploading server configuration files with dangerous extensions, a flaw in the interaction between these protections could allow attackers to bypass them. This vulnerability impacts Drupal Core versions up to 9.3.9 and is resolved in version 9.3.19.
The core of the vulnerability lies in how Drupal Core handles filenames with .htaccess extensions. Due to a flaw in the sanitization process, an attacker could upload a malicious .htaccess file, bypassing Drupal's default protections. This could lead to remote code execution (RCE) on the Apache web server hosting the Drupal site. The blast radius is significant, as successful exploitation could grant the attacker complete control over the server. This is similar to vulnerabilities that exploit misconfigured server files to gain unauthorized access.
CVE-2022-25277 was published on August 6, 2022. The CVSS score is 7.2 (HIGH). While no widespread exploitation has been reported, the potential for RCE makes it a critical vulnerability. Public proof-of-concept exploits are available, increasing the likelihood of exploitation. It is not currently listed on KEV or EPSS.
Exploit-Status
EPSS
0.29% (53% Perzentil)
CVSS-Vektor
The recommended mitigation is to upgrade Drupal Core to version 9.3.19 or later. Prior to upgrading, ensure that file upload permissions are properly configured and that only authorized file types are allowed. Consider implementing a Web Application Firewall (WAF) to filter potentially malicious file uploads. If an upgrade is not immediately feasible, restrict file upload permissions and carefully review all uploaded files for suspicious content. Implement stricter file extension whitelisting to prevent the upload of potentially dangerous files.
Actualice Drupal Core a la versión 9.3.19 o superior, o a la versión 9.4.3 o superior. Esta actualización corrige una vulnerabilidad que podría permitir la ejecución remota de código en servidores Apache si se permite la carga de archivos con la extensión .htaccess.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
A .htaccess file is a configuration file used by Apache web servers to control server behavior within a specific directory. It can be used for redirecting traffic, protecting directories, and more.
If you cannot update immediately, consider restricting file uploads to users with elevated privileges and monitor server logs for suspicious activity.
It only affects sites that allow uploads with the .htaccess extension. Review your site's configuration to determine if you are at risk.
You can find more information about this vulnerability on the Drupal website: [https://www.drupal.org/security/announce/9.3.19](https://www.drupal.org/security/announce/9.3.19)
KEV: no indicates that this vulnerability has not been cataloged in the Kernel Exploit Database (KEB).
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine composer.lock-Datei hoch und wir sagen dir sofort, ob du betroffen bist.