[Security-news] SA-CORE-2019-003 Notice of increased risk and Additional exploit path - PSA-2019-02-22
security-news at drupal.org
security-news at drupal.org
Sat Feb 23 01:23:47 UTC 2019
View online: https://www.drupal.org/psa-2019-02-22
Date: 2019-February-23
Vulnerability: SA-CORE-2019-003 Notice of increased risk and Additional
exploit path
Description:
This Public Service Announcement is a follow-up to SA-CORE-2019-003. This is
*not* an announcement of a new vulnerability. If you have not updated your
site as described in SA-CORE-2019-003 [1] you should do that now.
There are public exploits now available for this SA.
As far as we know, this is not being mass exploited at this time.
In the original SA we indicated this could be mitigated by blocking POST,
PATCH and PUT requests to web services resources, there is now a new way to
exploit this using GET requests.
The best mitigation is:
* If you are using Drupal 8.6.x, upgrade to Drupal 8.6.10 [2].
* If you are using Drupal 8.5.x or earlier, upgrade to Drupal 8.5.11 [3].
* Be sure to install any available security updates for contributed
projects
[4] after updating Drupal core.
This only applies to your site if:
* The site has the Drupal 8 core RESTful Web Services (rest) module
enabled.
OR
* The site has another web services module enabled, like JSON:API in Drupal
8, or Services or RESTful Web Services in Drupal 7, or custom code that
allows entity updates via non-form sources.
-------- WHAT TO DO IF YOUR SITE MAY BE COMPROMISED
--------------------------
Take a look at our existing documentation, ”Your Drupal site got hacked,
now what”. [5]
We’ll continue to update the SA [6] if novel types of exploit appear.
[1] https://www.drupal.org/SA-CORE-2019-003
[2] https://www.drupal.org/project/drupal/releases/8.6.10
[3] https://www.drupal.org/project/drupal/releases/8.5.11
[4] https://www.drupal.org/security/contrib
[5] https://www.drupal.org/node/2365547
[6] https://www.drupal.org/SA-CORE-2019-003
More information about the Security-news
mailing list