Drupal core 8 before versions 8.3.4 allows remote attackers to execute arbitrary code due to the PECL YAML parser not handling PHP objects safely during certain operations.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/99211 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038781 | Third Party Advisory VDB Entry |
https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-06-21/drupal-core-multiple | Patch Vendor Advisory |
http://www.securityfocus.com/bid/99211 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038781 | Third Party Advisory VDB Entry |
https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-06-21/drupal-core-multiple | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/99211 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038781 - Third Party Advisory, VDB Entry | |
References | () https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-06-21/drupal-core-multiple - Patch, Vendor Advisory |
Information
Published : 2018-08-06 15:29
Updated : 2024-11-21 03:30
NVD link : CVE-2017-6920
Mitre link : CVE-2017-6920
CVE.ORG link : CVE-2017-6920
JSON object : View
Products Affected
drupal
- drupal
CWE
CWE-19
Data Processing Errors