[Security-news] Drupal contrib - Highly Critical - Remote code execution PSA-2016-001
security-news at drupal.org
security-news at drupal.org
Tue Jul 12 17:37:55 UTC 2016
View online: https://www.drupal.org/node/2764899
* Advisory ID: DRUPAL-PSA-2016-001
* Project: Drupal contributed modules
* Version: 7.x
* Date: 2016-July-12
* Security risk: 22/25 ( Highly Critical)
AC:None/A:None/CI:All/II:All/E:Theoretical/TD:All [1]
* Vulnerability: Arbitrary PHP code execution
-------- DESCRIPTION
---------------------------------------------------------
There will be multiple releases of Drupal contributed modules on Wednesday
July 13th 2016 16:00 UTC that will fix highly critical remote code execution
vulnerabilities (risk scores up to 22/25 [2]). The Drupal Security Team urges
you to reserve time for module updates at that time because exploits are
expected to be developed within hours/days. Release announcements will appear
at the standard announcement locations. [3]
Drupal core is not affected. Not all sites will be affected. You should
review the published advisories on July 13th 2016 to see if any modules you
use are affected.
-------- CONTACT AND MORE INFORMATION
----------------------------------------
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [4].
Learn more about the Drupal Security team and their policies [5], writing
secure code for Drupal [6], and securing your site [7].
Follow the Drupal Security Team on Twitter at
https://twitter.com/drupalsecurity [8]
[1] https://www.drupal.org/security-team/risk-levels
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/security/contrib
[4] https://www.drupal.org/contact
[5] https://www.drupal.org/security-team
[6] https://www.drupal.org/writing-secure-code
[7] https://www.drupal.org/security/secure-configuration
[8] https://twitter.com/drupalsecurity
More information about the Security-news
mailing list