9.8
CVSSv3

CVE-2018-7600

Published: 29/03/2018 Updated: 01/03/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 784
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Drupal prior to 7.58, 8.x prior to 8.3.9, 8.4.x prior to 8.4.6, and 8.5.x prior to 8.5.1 allows remote malicious users to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

drupal drupal

debian debian linux 9.0

debian debian linux 8.0

debian debian linux 7.0

Vendor Advisories

Debian Bug report logs - #894259 drupal7: CVE-2018-7600: SA-CORE-2018-002 Package: src:drupal7; Maintainer for src:drupal7 is Gunnar Wolf <gwolf@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 27 Mar 2018 20:54:09 UTC Severity: grave Tags: security, upstream Found in versions drupal7/7 ...
A remote code execution vulnerability exists within multiple subsystems of Drupal 7x and 8x This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised ...

Exploits

#!/usr/bin/env ruby # # [CVE-2018-7600] Drupal < 758 / < 839 / < 846 / < 851 - 'Drupalgeddon2' (SA-CORE-2018-002) ~ githubcom/dreadlocked/Drupalgeddon2/ # # Authors: # - Hans Topo ~ githubcom/dreadlocked // twittercom/_dreadlocked # - g0tmi1k ~ blogg0tmi1kcom/ // twittercom/g0tmi1k ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info={}) super(update_info(info, 'Name' ...
#!/usr/bin/env import sys import requests print ('################################################################') print ('# Proof-Of-Concept for CVE-2018-7600') print ('# by Vitalii Rudnykh') print ('# Thanks by AlbinoDrought, RicterZ, FindYanot, CostelSalanders') print ('# githubcom/a2u/CVE-2018-7600') print ('######################## ...
Drupal versions before 758, 8x before 839, 84x before 846, and 85x before 851 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations ...
This Metasploit module exploits a Drupal property injection in the Forms API Drupal versions 6x, less than 758, 82x, less than 839, less than 846, and less than 851 are vulnerable ...
Drupal versions prior to 758, 839, 846, and 851 Drupalgeddon2 remote code execution proof of concept exploit ...

Github Repositories

CVE-2018-7600【Drupal7】批量扫描工具。

CVE-2018-7600-Drupal7 CVE-2018-7600【Drupal7】批量扫描工具。 主文件:CVE-2018-7600-Drupal7py 其实本质是封装了`whoami`的exp Drupal7/8的原理是一样的但该脚本当是只做了7的适配 提供`targettxt`作为目标输入,结果自动输出到`resulttxt`文件 因为是好久前写的脚本现在分享一下,有不够精致的地方还请多多

CVE-2018-7600 POC (Drupal RCE)

POC of CVE-2018-7600 Drupal RCE CVE-2018-7600 Dont Forget to Put Your Adress into the Script ! Description: A remote code execution vulnerability exists within multiple subsystems of Drupal 7x and 8x This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised Solution: Upgrade to the most

ExploitDev Journey #2 | CVE-2018-7600 | Drupal 7x Module Services - Remote CommandCode Execution Original exploit: wwwexploit-dbcom/exploits/41564 Exploit name: Drupal 7x Module Services - Remote Code Execution CVE: 2018-7600 Lab: Bastard - HackTheBox Description There is a vulnerability in Drupal 7x that allows us to create a malformed request that contains a s

CVE-2018-7600 and CVE-2018-7602 Mass Exploiter

Drupalgeddon-Mass-Exploiter CVE-2018-7600 and CVE-2018-7602 Mass Exploiter Usuage : python3 masspy list output workers proxy(default:none) exploitnumber #exploitnumber: 7=CVE-2018-7600 8=CVE-2018-7602

MASS Exploiter

CVE-2018-7600-Drupal-RCE

Liste des outils pour l'audit des cms (merci à M0N5T3R) Wordpress WpscaN Project githubcom/04x/WpscaN wpscan githubcom/wpscanteam/wpscan wordpresscan githubcom/swisskyrepo/Wordpresscan wpseku githubcom/m4ll0k/WPSeku Zoom githubcom/gcxtx/Zoom wordpress-exploit-framework githubcom/rastating/wordpress-exploit-framew

💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002

IMPORTANT: Is provided only for educational or information purposes Protect rules for ModSecurity (by fuzzylogic) Protect rules for ModRewrite htaccess FOR MEDIA: Please do not post a link to this repository in your articles, without specifying how to protect against an attack (recommend updating Drupal, setting rules for WAF, etc) PoC based CheckPoint article res

Exploits Drupalgeddon2 [CVE-2018-7600]: $ ruby -v ruby 251p57 (2018-03-29 revision 63029) [x86_64-linux-gnu] $ ruby drupalgeddon2rb examplecom $ ruby drupalgeddon2-not-write-shellrb <target> <version [7,8]> <command> [php_method] [form_path] ruby drupalgeddon2-not-write-shellrb 7

CVE-2018-7600 - Drupal 7.x RCE

CVE-2018-7600 CVE-2018-7600 - Drupal 7x RCE Drupal < 758 unauthenticated RCE Requirements python3 python requests (pip install requests) Usage Install dependencies modify the HOST variable in the script run the code win Just install requests (pip install requests), edit the file to change the host and run the exploit: python \pocpy uid=33(www-data) gid=33(www-dat

The exploit python script for CVE-2018-7600

drupalgeddon2 The exploit python script for CVE-2018-7600

A (small) web exploit framework

ten My (small) web exploit framework I got tired of writing standard code over and over again, so I made this Makes code more concise, clearer, faster to write Might be useful to you It helps with HTTP interactions, handling user input, providing clear output, handling files, and running shell commands Useful to build POCs, and convert them into full, documented exploits i

Exploit for CVE-2018-7600.. called drupalgeddon2,

drupalgeddon2 Exploit for CVE-2018-7600 Usage: drupalgeddon2 options -h: Url target -c: OS command Examples: drupalgeddon2py -h wwwvictimcom -c 'ls -la' Based in githubcom/FireFart/CVE-2018-7600

(CVE-2019-6340, CVE-2018-7600) drupal8-REST-RCE

drupal8-REST-RCE CVE-2019-6340 drupal8-REST-RCE (/node/1) , CVE-2018-7600 drupal8 RCE (/user/register) Unix/Linux command - remote code Execution (command "id") Usage> python drupal8-REST-RCEpy <dst_ip> <dst_port> (user defined port) python drupal8-REST-RCEpy <dst_ip> (default : 80/tcp)

Drupalgeddon-Toolkit Toolkits that crawl data, drupal sites with version, detect CVE-2018-7600 & CVE-2019-6340 Requirements Python 27 or Python 34+ Works on Linux, Windows Getting Started Crawl data Crawl websites Broad Crawl Spider using Scrapy Framework (githubcom/scrapy/scrapy/tree/master/scrapy) Warning: Desperately take time, Do not try it at home Con

NSX-T IDS with Network Container Plugin The repository contains the Kubernetes manifests for the deployment of an old Drupal (70), PHP (56), MySQL (50) setup Drupal 70 container image is built from the provided Dockerfile There are some CVEs that will trigger alarms on the IDS: MySQL DELETE tbl_name heap buffer overflow (CVE-2012-5612) Drupal 7 Preauth SQL Injection (CVE

Drupal CVE-2018-7600 RCE Pseudo-Shell PoC

CVE-2018-7600 Proof of Concept Exploit for Drupal CVE-2018-7600 RCE with Pseudo-Shell and proxy support

Drupal-CVE-2018-7600 Usage: python3 exploit_drupal_cve-2018-7600py <target ip>

Drupal 远程代码执行漏洞(CVE-2018-7602) 影响软件:drupal 方式:对URL中的#进行编码两次,绕过sanitize()函数过滤 效果:任意命令执行 漏洞环境 执行如下命令启动drupal 757的环境: docker-compose up -d 环境启动后,访问 your-ip:8081/ 将会看到drupal的安装页面,

Detect CVE for website

Detect CVE Tool that detect CVE of website Requirements Python 27 or Python 34+ Works on Linux, Windows Detect CVE of Drupal sites CVE 2018 - 7600 (Drupalgeddon) + CVE 2019 - 6340 With input file (drupal sites with version) autocraft-kznru|5 bergeraultcom|5 leisureandculturedundeecom|5 Return normal site and vulnerable site

CVE-2018-7600【Drupal7】批量扫描工具。

CVE-2018-7600-Drupal7 CVE-2018-7600【Drupal7】批量扫描工具。 主文件:CVE-2018-7600-Drupal7py 其实本质是封装了`whoami`的exp Drupal7/8的原理是一样的但该脚本当是只做了7的适配 提供`targettxt`作为目标输入,结果自动输出到`resulttxt`文件 因为是好久前写的脚本现在分享一下,有不够精致的地方还请多多

Drupal

CVE-2018-7600 | Drupal 85x < 851 / 84x < 846 / 8x < 839 / 7x? < 758 / < 6x? - 'Drupalgeddon2' RCE (SA-CORE-2018-002) Drupalggedon2 ~ githubcom/dreadlocked/Drupalgeddon2/ (wwwdrupalorg/sa-core-2018-002) Supports: Drupal < 839 / < 846 / < 851 ~ user/register URL, attacking ac

drupalgeddon-shell-exploit for Drupal 800 A Bash script to exploit the Drupalgeddon2 vulnerability (CVE-2018-7600) in Drupal websites This vulnerability allows an attacker to execute arbitrary code on the server by exploiting a flaw in the Drupal core Requirements This script requires the following tools to be installed on the system: Bash shell curl Usage To use this scri

Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002)

CVE-2018-7600 | Drupal 85x < 851 / 84x < 846 / 8x < 839 / 7x? < 758 / < 6x? - 'Drupalgeddon2' RCE (SA-CORE-2018-002) Drupalggedon2 ~ githubcom/dreadlocked/Drupalgeddon2/ (wwwdrupalorg/sa-core-2018-002) Supports: Drupal < 839 / < 846 / < 851 ~ user/register URL, attacking ac

Enterprise Network Architecture and Attack and Defense

Enterprise-Network-Architecture-and-Attack-and-Defense 一、云网络环境设计与搭建 拓扑结构 安全版本的拓扑结构如下: 不同区域的连接 OpenWrt+ZeroTier a3fcc2e114b5png) 网络拓扑补充 内部网络访问结果 外部网络访问结果 拓扑结构简介 防火墙、IDS、IPS 在大型网络架构中,有交换机、路由器、防火墙

CVE-2018-7600 python3 exploitpy

Testing and exploitation tool for Drupalgeddon 2 (CVE-2018-7600)

CVE-2018-7600 Testing and exploitation tool for Drupalgeddon 2 (CVE-2018-7600) Install: sudo pip install -r requirementstxt python Drupalgeddon2py -t drupalorg -c id

CVE-2018-7600 (Drupal)

CVE-2018-7600 CVE-2018-7600 Exploit Change TARGET in exploitpy $ python3 exploitpy Success: Check 127001:8080/hellotxt

CVE-2018-7600 Drupal Drupalgeddon 2 远程代码执行漏洞利用脚本

+----------------------------------------------------------------------+ + DES: by zhzyker as githubcom/zhzyker/exphub + + Drupal Drupalgeddon 2 远程代码执行 CVE-2018-7600 + +----------------------------------------------------------------------+ + USE: python3 <filename> <url>

Drupal - Drupalgeddon2 (CVE 2018-7600) $ python3 drupalgeddonpy -h [+] drupalgeddon2 (CVE-2018-7600) exploit by Rafael Caria usage: drupalgeddonpy [-h] --url URL [--command COMMAND] [--function FUNCTION] [--test] [--proxy PROXY] [!] This script exploits (CVE-2018-7600) a Drupal property injection in the Forms API Drupal 6x, < 758, 82x, < 839, < 8

MSF exploit module for Drupalgeddon 2 (CVE-2018-7600 / SA-CORE-2018-002)

Drupalgeddon 2 MSF exploit module for Drupalgeddon 2 (CVE-2018-7600 / SA-CORE-2018-002) Drupal before 758, 8x before 839, 84x before 846, and 85x before 851 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations The module can load msf PHP arch payloads, using the php/base64 e

CVE-2018-7600 | Drupal 85x < 851 / 84x < 846 / 8x < 839 / 7x? < 758 / < 6x? - 'Drupalgeddon2' RCE (SA-CORE-2018-002) Drupalggedon2 ~ githubcom/dreadlocked/Drupalgeddon2/ (wwwdrupalorg/sa-core-2018-002) Supports: Drupal < 839 / < 846 / < 851 ~ user/register URL, attacking ac

POC-EXP 漏洞 备注 Drupal Drupalgeddon 2 远程代码执行漏洞(CVE-2018-7600) 复现分析 小米系列路由器漏洞(CVE-2019-18371/CVE-2019-18370) 漏洞报告

Drupal 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.

CVE-2018-7600 Only working on version 8, not 7 Install git clone githubcom/0xAJ2K/CVE-2018-7600git pip3 install -r requirementstxt python3 CVE-2018-7600py Usage python3 CVE-2018-7600py -u 17231127 Expected output kali :: /opt/myscripts » /CVE-2018-7600py -u 1

A curated list of resources for testing reliablity and impregnability of your system.

<script src="/path/to/highlightpackjs"></script> <script>hljsinitHighlightingOnLoad();</script> pentest-resources A curated list of resources for testing reliablity and impregnability of your system using Kali Host and port discovery # Scan for hosts with IPs in a particular range in your network sudo n

The exploit python script for CVE-2018-7600

drupalgeddon2 The exploit python script for CVE-2018-7600

Proof-of-Concept for Drupal CVE-2018-7600 / SA-CORE-2018-002

Proof-Of-Concept for CVE-2018-7600 / SA-CORE-2018-002 Drupal before 758, 8x before 839, 84x before 846, and 85x before 851 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations How it works It sends a packet to the drupal_ajax wrapper to register a user Allows user to use

PoC for CVE-2018-7600 Drupal SA-CORE-2018-002 (Drupalgeddon 2).

CVE-2018-7600 PoC for CVE-2018-7600 Drupal SA-CORE-2018-002 (Drupalgeddon 2) Installation: $ git clone githubcom/dwisiswant0/CVE-2018-7600 $ cd CVE-2018-7600/ $ composer install Usage: $ php exploitphp WARNING! For Educational Purposes Only! References: - researchcheckpointcom/uncovering-drupalgeddon-2/ - nvdnistgov/vuln/detail/CVE-2018-76

ExploitDev Journey #2 | CVE-2018-7600 | Drupal 7x Module Services - Remote CommandCode Execution Original exploit: wwwexploit-dbcom/exploits/41564 Exploit name: Drupal 7x Module Services - Remote Code Execution CVE: 2018-7600 Lab: Bastard - HackTheBox Description There is a vulnerability in Drupal 7x that allows us to create a malformed request that contains a s

CVE-2018-7600 Drupal RCE

CVE-2018-7600 Drupal RCE Credits to: File Drupal Ver Source Comment poc0-curlsh 8 twittercom/i_bo0om/status/984674893768921089 twittercom/IamSecurity/status/984977193565646848 gistgithubcom/g0tmi1k/7476eec3f32278adc07039c3e5473708 poc1-a2upy 8 githubcom/a2u/CVE-2018-7600 poc2-dreadlockedrb 7+8 githubcom/dreadlocked/D

CVE-2018-7600

drupal-exploit CVE-2018-7600 This script will exploit the (CVE-2018-7600) vulnerability in Drupal 7 <= 757 by poisoning the recover password form (user/password) and triggering it with the upload file via ajax (/file/ajax) : drupalpy http(s)://drupaldomain/drupal/ uid=33(www-data) gid=33(www-data) groups=33(www-data) nvdnistgov/vuln/detail/CVE-2018-7600 ht

Exploit for Drupal 7 <= 7.57 CVE-2018-7600

Drupal 7 (CVE-2018-7600 / SA-CORE-2018-002) Install required libraries with: pip install requests pip install bs4 $ python3 drupa7-CVE-2018-7600py -h ============================================================================= | DRUPAL 7 &lt;= 757 REMOTE CODE EXECUTION (CVE-2018-7600) | |

CVE-2018-7600 | Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' RCE

CVE-2018-7600 | Drupal &lt; 758 / &lt; 839 / &lt; 846 / &lt; 851 - 'Drupalgeddon2' RCE (SA-CORE-2018-002) Inspired from githubcom/dreadlocked/Drupalgeddon2 Supports: Drupal &lt; 839 / &lt; 846 / &lt; 851 ~ user/register URL, attacking account/mail &amp; #post_render parameter, using PHP's passthru function [

一款集漏洞探测、攻击,Session会话,蜜罐识别等功能于一身的软件,基于go-micro微服务框架并对外提供统一HTTP API网关接口服务

gofor 一款集漏洞探测、攻击,Session会话,蜜罐识别等功能于一身的软件,基于go-micro微服务框架并对外提供统一HTTP API网关接口服务 HTTP API Gateway /api-srv Service Install(Optional) Exploit /srv-exploit Webshell /srv-webshell

仅用来记录审计过的PHP框架,具体的分析会部分的出现在博客中

复现清单 thinkphp 5024 反序列化链 5023 以下RCE 601 不安全的session 通达OA v115 以下任意用户登录 Thinkcmf 2x缓存Getshell PbootCMS v207 Getshell Drupal CVE-2018-7600 RCE Laravel 反序列化链(run函数入口) 反序列化链0day(奶权的,十分精彩) Dedecms 后台模板RCE(CVE-2018-7700) 实战 慢慢的从输

Drupal Remote Shell

Drupal Remote Shell A remote shell using CVE-2018-7600 and CVE-2019-6340 Use : /DRS(2)py http[s]://hostname|IP[:port] Shell is very basic No command completion, no directory change, DRSpy works with any Drupal vulnerable versions : &lt;851, &lt;846 , &lt;839 and &lt;758 DRS2py works with any Drupal vulnerable versions : &lt;8610, &lt;8

Tool to check for CVE-2018-7600 vulnerability on several URLS

CVE-2018-7600-Masschecker Tool to check for CVE-2018-7600 vulnerability on several URLS

Shell script searching for known CVE & Exploit associated with a product name/version

DESCRIPTION This Script searches in cvecircllu known CVE &amp; Exploit and qualify them with the following rules : Critical when CVSS &gt;= 9 High when CVSS &lt; 9 &amp; &gt;= 7 Medium when CVSS &lt;= 4 &amp; &gt; 7 Low when CVSS &lt; 4 This script uses jq and bc GUIDE To launch the s

插件化漏洞扫描器

kun scanner (项目重构,不再更新) 插件化漏洞扫描器 简介: 插件化漏洞扫描器,对大量目标(单个目标,IP段,文件、API、爬虫)和大量POC组合快速批量漏洞测试,支持web、终端两种操作方式。 适合做什么 因为扫描器是对目标和插件组合使用多线程进行测试,所以速度提升是提升在对组

dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.

dDump3r dDump3r is a Drupal Vulnerability Scanner &amp; Auto Exploiter This tool can be used to massly scan drupal based websites Exploits As for now, dDump3r is still too small but good, it only haves these major exploits: Remote Code Execution (CVE-2018-7600) Add New Admin (CSRF) Add New Admin Exploit (OLD) Usage 1) Type `perl dDump3rpl` in your cmd or conso

Vulnerable Machines Walkthrough Lampiao - CHANGELOG, CVE-2018-7600 (druppalgeddon2), CVE-2016-5195 (dirtycow), 440-31 HTB-Help - HelpDeskZ, CVE-2017-16695(get_rekt), File Upload HTB-Curling - Joomla, Insecure File Permissions, Curl

Vulnerable Machines Walkthrough Lampiao - CHANGELOG, CVE-2018-7600 (druppalgeddon2), CVE-2016-5195 (dirtycow), 440-31 HTB-Help - HelpDeskZ, CVE-2017-16695(get_rekt), File Upload HTB-Curling - Joomla, Insecure File Permissions, Curl

OSCP cheat sheet 2023 0 Preparation Read the OSCP dos and don'ts Practice taking screenshot while you hack Get a document file ready to paste your walkthrough screenshots 1 Recon Recon is an essential OSCP skill set If you do have good recon skills, it makes the exam much easier The tools included in this cheat sheet might not be enough The content is created based

CVE-2018-7600 | Drupal 85x &lt; 851 / 84x &lt; 846 / 8x &lt; 839 / 7x? &lt; 758 / &lt; 6x? - 'S4nji1-Drupalgeddon2' RCE (SA-CORE-2018-002) Drupalggedon2 ~ githubcom/emzkie2018/S4nji1-Drupalgeddon2/ (wwwdrupalorg/sa-core-2018-002) Supports: Drupal &lt; 839 / &lt; 846 / &lt; 851 ~ user/register URL,

Drupal-CVE-2018-7600 Usage: python3 exploit_drupal_cve-2018-7600py &lt;target ip&gt;

CVE-2018-7600 0-Day Exploit (cyber-warrior.org)

drupalhunter CVE-2018-7600 0-Day Exploit (cyber-warriororg)

CLAIRE: CLoud Automated Incident REsponse

claire claire was developed as part of my MSc in Information Security from Royal Holloway; and is not my girlfriend Automating Incident Response There are 3 main parts to this project the first is serverless application build with AWS Step Functions and Lambdas written in Python to respond to incidents on EC2 instances by Tagging the instance and capturing instance metadata T

CVE-2018-7600 漏洞验证和利用

CVE-2018-7600 CVE-2018-7600 漏洞验证和利用 Drupal &lt; 839 / &lt; 846 / &lt; 851 - 'Drupalgeddon2' Remote Code Execution PS D:\CVE-2018-7600&gt; python \PoCpy Input target URL (example: examplecom/): 19216845:8080/ Exploitable! Check: 19216845:8080/hhtxt PS D:\CVE-2018

WEB渗透的一些功能

Sword WordPress WordPress用户名检测、登录密码暴破。直接点击Crack不会自动获取网站用户名并进行暴破,而是从UserName获取用户名,如果为空就会获取用户再暴破。Thead不建议修改。 Liferay CVE-2020-7961的漏洞利用,包括漏洞检测(执行一个命令)、命令执行、GetWebShell、上传自定义WebShell、MSF

CVE-2018-7600 | Drupal 85x &lt; 851 / 84x &lt; 846 / 8x &lt; 839 / 7x? &lt; 758 / &lt; 6x? - 'Drupalgeddon2' RCE (SA-CORE-2018-002) Drupalggedon2 ~ githubcom/dreadlocked/Drupalgeddon2/ (wwwdrupalorg/sa-core-2018-002) Supports: Drupal &lt; 839 / &lt; 846 / &lt; 851 ~ user/register URL, attacking ac

cve-2018-7600

CVE-2018-7600 This is part of Cved: a tool to manage vulnerable docker containers Cved: githubcom/git-rep-src/cved Image source: githubcom/cved-sources/cve-2018-7600 Image author: githubcom/knqyf263/CVE-2018-7600

Drupalgeddon2 Remote Code Execution Description In march 2018, a critical vulnerability was discovered on Drupal before 758, 8x before 839, 84x before 846, and 85x before 851, which allowed to remote attackers the execution of arbitrary code, with a CVE identifier of CVE-2018-7600 Installation git clone githubcom/ret2x-tools/drupalgeddon2-rcegit pip insta

Recent Articles

US-CERT lists the 10 most-exploited security bugs and, yeah, it's mostly Microsoft holes people forgot to patch
The Register • Shaun Nichols in San Francisco • 14 May 2020

Update, update, update. Plus: Flash, Struts, Drupal also make appearances Sadly, 111 in this story isn't binary. It's decimal. It's the number of security fixes emitted by Microsoft this week

Vulnerabilities in Microsoft Windows, Office, and Windows Server, for which patches have been available for years, continue to be the favorite target for hackers looking to spread malware. A list posted by US-CERT this week rattles off the 10 most oft-targeted security vulnerabilities during the past three years, and finds that, shock horror, for the most part, keeping up with patching will keep you safe. Microsoft ranks highly in the list because its software is widely used, and provides the mo...

Running Drupal? You need to patch, patch, patch right now!
The Register • Kieren McCarthy in San Francisco • 28 Mar 2018

Website building biz warns exploit may come in hours BDSM sex rocks Drupal world: Top dev banished for sci-fi hanky-panky

Anyone running a website built with Drupal should stop whatever they are doing right now and install critical security patches. The organization behind the open-source software today put out an urgent security patch to address a remote code execution vulnerability in "multiple subsystems" of its content management system software. The holes could allow hackers to attack a Drupal-powered website in a number of different ways and that "could result in the site being completely compromised." In oth...