Demonstration on exploitation on Drupal 7.57 (CVE-2018-7600) with and without WAF(Web Application Firewall)
The project shows how the exploitation of Drupal 7.57 looks like in two different scenarios:
- Unprotected server → successful exploitation with Metasploit and obtaining a Meterpreter shell.
- Protected server → the same vulnerable version, but with protection applied (ModSecurity + OWASP CRS) → the exploitation fails.
- Operating Systems: Ubuntu Server 16.04 (unprotected), Ubuntu Server 22.04 (protected), Kali Linux
- Web Server: Apache2
- Database: MySQL / MariaDB
- PHP: PHP 7.0 and PHP 7.4 (depending on the scenario)
- Drupal: version 7.57
- Security Tools: ModSecurity
- Attack: Metasploit Framework (drupalgeddon2 module)
- Sara Dobrevska
- Tеа Celikiк
Note: All activities were performed in a controlled lab environment. It is prohibited to use these commands outside of isolated test environments.