New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2018-7600 (Drupalgedon2) #9789
Comments
Why don't you do it yourself? There's a good discussion about it here: https://greysec.net/showthread.php?tid=2912 |
Would love to do it myself! Unfortunately my coding skills are very limited. Thanks for sharing this link! |
There are still no exploit be published. |
You can find more information about contributing to the Framework on the wiki, specifically: |
|
FYI, Drupal 8.5.0 can exploit directly without auth, but Drupal 8.0-8.4.x is login required. |
@RicterZ I've tested against Drupal 8.4.5 with the Poc.
|
@nieldk ooops, drupal 8.4.5 also can be exploit by this script.. |
I'll whip up a module for this. Was hoping to last night, but sleep overrode. :-) |
If you use passthru instead of exec, you can view the output of the command in the response. Nice if you don't want to bother with cleaning up a webshell.
|
Depends on what all is enabled/disabled in PHP, but |
Some PHP functions output can be passed directly back to the browser. e.x: passthru, printf. |
José Ignacio Rojo (@jirojo2) created a module for this: https://github.com/jirojo2/drupalggedon2 |
I actually need to port all the drupal7 bits, and I am considering using
`assert` or `eval` instead of `exec`, and keep the PHP arch of the module
El mié., 18 abr. 2018 20:14, adampankow <notifications@github.com> escribió:
… José Ignacio Rojo ***@***.*** <https://github.com/jirojo2>) created a
module for this: https://github.com/jirojo2/drupalggedon2
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#9789 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ADbZ1oYCsn0-9iiJmlV-cuA3J3sHHIfWks5tp4J-gaJpZM4TCPWn>
.
|
Hi, @jirojo2. Did you see #9876? Btw, I tested
Great work on your end! Feel free to drop by the open PR if you want to collaborate. :) |
Hi !
Would it be possible to make an exploit module for the CVE-2018-7600 (Drupalgedon2) please ?
Thanks,
syrius01
The text was updated successfully, but these errors were encountered: