Skip to content

tea-celikik/Drupal-Exploit-Lab

Repository files navigation

Drupal-Exploit-Lab

Demonstration on exploitation on Drupal 7.57 (CVE-2018-7600) with and without WAF(Web Application Firewall)

Description

The project shows how the exploitation of Drupal 7.57 looks like in two different scenarios:

  1. Unprotected server → successful exploitation with Metasploit and obtaining a Meterpreter shell.
  2. Protected server → the same vulnerable version, but with protection applied (ModSecurity + OWASP CRS) → the exploitation fails.

Technologies and Tools

  • Operating Systems: Ubuntu Server 16.04 (unprotected), Ubuntu Server 22.04 (protected), Kali Linux
  • Web Server: Apache2
  • Database: MySQL / MariaDB
  • PHP: PHP 7.0 and PHP 7.4 (depending on the scenario)
  • Drupal: version 7.57
  • Security Tools: ModSecurity
  • Attack: Metasploit Framework (drupalgeddon2 module)

Authors

  • Sara Dobrevska
  • Tеа Celikiк

Note: All activities were performed in a controlled lab environment. It is prohibited to use these commands outside of isolated test environments.

About

Demonstration on exploitation on Drupal 7.57 (CVE-2018-7600) with and without WAF(Web Application Firewall)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors