7.5
CVSSv2

CVE-2014-3704

Published: 16/10/2014 Updated: 29/09/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 802
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The expandArguments function in the database abstraction API in Drupal core 7.x prior to 7.32 does not properly construct prepared statements, which allows remote malicious users to conduct SQL injection attacks via an array containing crafted keys.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

drupal drupal

debian debian linux 7.0

Vendor Advisories

Debian Bug report logs - #765507 [drupal7] CVE-2014-3704 - Drupal - pre Auth SQL Injection Vulnerability Package: drupal7; Maintainer for drupal7 is Gunnar Wolf <gwolf@debianorg>; Source for drupal7 is src:drupal7 (PTS, buildd, popcon) Reported by: Ingo Juergensmann <ij@2013bluespiceorg> Date: Wed, 15 Oct 2014 17: ...
Stefan Horst discovered a vulnerability in the Drupal database abstraction API, which may result in SQL injection For the stable distribution (wheezy), this problem has been fixed in version 714-2+deb7u7 For the unstable distribution (sid), this problem has been fixed in version 732-1 We recommend that you upgrade your drupal7 packages ...

Exploits

Drupal versions 70 through 731 suffer from a remote SQL injection vulnerability ...
<?php // _____ __ __ _ _______ // / ___/___ / /__/ /_(_)___ ____ / ____(_)___ _____ // \__ \/ _ \/ //_/ __/ / __ \/ __ \/ __/ / / __ \/ ___/ // ___/ / __/ ,< / /_/ / /_/ / / / / /___/ / / / (__ ) // /____/\___/_/|_|\__/_/\____/_/ /_/_____/_/_/ /_/____/ // Poc for Drupal Pre Auth SQL Injection - (c) 2014 Sekti ...
# Drupal 7x SQL Injection SA-CORE-2014-005 wwwdrupalorg/SA-CORE-2014-005 # Creditz to wwwredditcom/user/fyukyuk # EDB Note ~ Updated version: githubcom/kenorb/drupageddon/blob/master/drupal_7x_sql_injection_sa-core-2014-005py import urllib2,sys from drupalpass import DrupalHash # githubcom/cvangysel/gitexd- ...
#!/usr/bin/python # # # Drupal 7x SQL Injection SA-CORE-2014-005 wwwdrupalorg/SA-CORE-2014-005 # Inspired by yukyuk's PoC (wwwredditcom/user/fyukyuk) # # Tested on Drupal 731 with BackBox 3x # # This material is intended for educational # purposes only and the author can not be held liable for # any kind of damages done ...
<?php #-----------------------------------------------------------------------------# # Exploit Title: Drupal core 7x - SQL Injection # # Date: Oct 16 2014 # # Exploit Author: Dustin Dörr # # Software Link: htt ...

Nmap Scripts

http-vuln-cve2014-3704

Exploits CVE-2014-3704 also known as 'Drupageddon' in Drupal. Versions < 7.32 of Drupal core are known to be affected.

nmap --script http-vuln-cve2014-3704 --script-args http-vuln-cve2014-3704.cmd="uname -a",http-vuln-cve2014-3704.uri="/drupal" <target>
nmap --script http-vuln-cve2014-3704 --script-args http-vuln-cve2014-3704.uri="/drupal",http-vuln-cve2014-3704.cleanup=false <target>

PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-vuln-cve2014-3704: | VULNERABLE: | Drupal - pre Auth SQL Injection Vulnerability | State: VULNERABLE (Exploitable) | IDs: CVE:CVE-2014-3704 | The expandArguments function in the database abstraction API in | Drupal core 7.x before 7.32 does not properly construct prepared | statements, which allows remote attackers to conduct SQL injection | attacks via an array containing crafted keys. | | Disclosure date: 2014-10-15 | Exploit results: | Linux debian 3.2.0-4-amd64 #1 SMP Debian 3.2.51-1 x86_64 GNU/Linux | References: | https://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html | https://www.drupal.org/SA-CORE-2014-005 | http://www.securityfocus.com/bid/70595 |_ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3704
http-vuln-cve2014-3704

Exploits CVE-2014-3704 also known as 'Drupageddon' in Drupal. Versions < 7.32 of Drupal core are known to be affected.

nmap --script http-vuln-cve2014-3704 --script-args http-vuln-cve2014-3704.cmd="uname -a",http-vuln-cve2014-3704.uri="/drupal" <target>
nmap --script http-vuln-cve2014-3704 --script-args http-vuln-cve2014-3704.uri="/drupal",http-vuln-cve2014-3704.cleanup=false <target>

PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-vuln-cve2014-3704: | VULNERABLE: | Drupal - pre Auth SQL Injection Vulnerability | State: VULNERABLE (Exploitable) | IDs: CVE:CVE-2014-3704 | The expandArguments function in the database abstraction API in | Drupal core 7.x before 7.32 does not properly construct prepared | statements, which allows remote attackers to conduct SQL injection | attacks via an array containing crafted keys. | | Disclosure date: 2014-10-15 | Exploit results: | Linux debian 3.2.0-4-amd64 #1 SMP Debian 3.2.51-1 x86_64 GNU/Linux | References: | https://www.sektioneins.de/en/advisories/advisory-012014-drupal-pre-auth-sql-injection-vulnerability.html | https://www.drupal.org/SA-CORE-2014-005 | http://www.securityfocus.com/bid/70595 |_ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3704

Github Repositories

Python tutorials

python系列教程(翻译) ~# python &gt;&gt;&gt; import urllib &gt;&gt;&gt; from bs4 import BeautifulSoup &gt;&gt;&gt; url = urlliburlopen("wwwprimalsecuritynet") &gt;&gt;&gt; output = BeautifulSoup(urlread(), 'lxml') &gt;&gt;&gt; outputtitle &lt;title&gt;Primal Security Podcast

NSX-T IDS with Network Container Plugin The repository contains the Kubernetes manifests for the deployment of an old Drupal (70), PHP (56), MySQL (50) setup Drupal 70 container image is built from the provided Dockerfile There are some CVEs that will trigger alarms on the IDS: MySQL DELETE tbl_name heap buffer overflow (CVE-2012-5612) Drupal 7 Preauth SQL Injection (CVE

CVE & others

██╗ ██╗███████╗██╗ ██████╗ ███████╗██╗ ██╗██╗ ██║ ██║██╔════╝██║ ██╔══██╗██╔════╝██║ ██║██║ ███████║█████╗ ██║ ██████╔╝████

##python系列教程(翻译) ~# python &gt;&gt;&gt; import urllib &gt;&gt;&gt; from bs4 import BeautifulSoup &gt;&gt;&gt; url = urlliburlopen("wwwprimalsecuritynet") &gt;&gt;&gt; output = BeautifulSoup(urlread(), 'lxml') &gt;&gt;&gt; outputtitle &lt;title&gt;Primal Security Podca

##python系列教程(翻译) ~# python &gt;&gt;&gt; import urllib &gt;&gt;&gt; from bs4 import BeautifulSoup &gt;&gt;&gt; url = urlliburlopen("wwwprimalsecuritynet") &gt;&gt;&gt; output = BeautifulSoup(urlread(), 'lxml') &gt;&gt;&gt; outputtitle &lt;title&gt;Primal Security Podca

Recent Articles

DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
The Register • Darren Pauli • 30 Oct 2014

SQLi hole was hit hard, fast, and before most admins knew it needed patching

Drupal websites that had not patched seven hours after the disclosure on a "highly critical" SQL injection (SQLi) hole disclosed on 15 October are essentially hosed, the content management tool's developers say. Attacks against the vulnerability (CVE-2014-3704) in version seven of the content management system began "hours" after announcement detailing how the easily exploitable bug granted full control including the execution of malicious code to attackers. Flaw disclosers SektionEins described...

Drupal SQL injection nasty leaves sites 'wide open' to attack
The Register • John Leyden • 16 Oct 2014

Usual drill - install the patch tout de suite

A newly patched SQL injection flaw in Drupal leaves sites that rely on the widely used web development platform wide open to attack. Admins of sites that run Drupal 7 should upgrade to 7.32 to guard against possible attack. Patching needs to take place sooner rather than later because the easy-to-exploit vulnerability hands over total control – including the ability to load malicious code - to attackers running attacks against vulnerable websites. The CVE-2014-3704 vulnerability in Drupal 7 ha...