[Security-news] File (Field) Paths - Critical - Remote Code Execution - SA-CONTRIB-2018-056

security-news at drupal.org security-news at drupal.org
Wed Aug 15 16:37:53 UTC 2018


View online: https://www.drupal.org/sa-contrib-2018-056

Project: File (Field) Paths [1]
Date: 2018-August-15
Security risk: *Critical* 15∕25
AC:Basic/A:User/CI:Some/II:All/E:Theoretical/TD:Default [2]
Vulnerability: Remote Code Execution

Description: 
This module enables you to automatically sort and rename your uploaded files
using token based replacement patterns to maintain a nice clean filesystem.

The module doesn't sufficiently sanitize the path while a new file is
uploading, allowing a remote attacker to execute arbitrary PHP code.

This vulnerability is mitigated by the fact that an attacker must have access
to a form containing a widget processed by this module.

Solution: 
Install the latest version:

   * If you use the filefield_paths module for Drupal 7.x, upgrade to
     filefield_paths  7.x-1.1 [3]

Reported By: 
   * Wayne Eaker  [4]

Fixed By: 
   * Oleh Vehera  [5]

Coordinated By: 
   * Michael Hess [6] of the Drupal Security Team


[1] https://www.drupal.org/project/filefield_paths
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/filefield_paths/releases/7.x-1.1
[4] https://www.drupal.org/user/326925
[5] https://www.drupal.org/user/3260314
[6] https://www.drupal.org/u/mlhess



More information about the Security-news mailing list