View online: https://www.drupal.org/sa-contrib-2018-056
Project: File (Field) Paths [1] Date: 2018-August-15 Security risk: *Critical* 15∕25 AC:Basic/A:User/CI:Some/II:All/E:Theoretical/TD:Default [2] Vulnerability: Remote Code Execution
Description: This module enables you to automatically sort and rename your uploaded files using token based replacement patterns to maintain a nice clean filesystem.
The module doesn't sufficiently sanitize the path while a new file is uploading, allowing a remote attacker to execute arbitrary PHP code.
This vulnerability is mitigated by the fact that an attacker must have access to a form containing a widget processed by this module.
Solution: Install the latest version:
* If you use the filefield_paths module for Drupal 7.x, upgrade to filefield_paths 7.x-1.1 [3]
Reported By: * Wayne Eaker [4]
Fixed By: * Oleh Vehera [5]
Coordinated By: * Michael Hess [6] of the Drupal Security Team
[1] https://www.drupal.org/project/filefield_paths [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/filefield_paths/releases/7.x-1.1 [4] https://www.drupal.org/user/326925 [5] https://www.drupal.org/user/3260314 [6] https://www.drupal.org/u/mlhess