Miggo Logo

CVE-2016-3168:
Drupal Reflected file download vulnerability

6.4

CVSS Score

Basic Information

EPSS Score
-
CWE
-
Published
5/17/2022
Updated
4/23/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
drupal/corecomposer>= 6.0, < 6.386.38
drupal/corecomposer>= 7.0, < 7.437.43
drupal/drupalcomposer>= 7.0, < 7.437.43
drupal/drupalcomposer>= 6.0, < 6.386.38

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability (CVE-2016-3168) involves reflected file downloads via the System module. Batch processing in Drupal uses system_batch_page() to handle batch operations, which returns JSON data. If this endpoint doesn't enforce proper Content-Type/Content-Disposition headers, browsers may treat the JSON response as a downloadable file. Attackers could manipulate parameters to control the content and filename, exploiting administrator sessions. The System module's batch handling is the logical location for this flaw, as confirmed by Drupal's security advisory linking the issue to improper response handling in batch operations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** Syst*m mo*ul* in *rup*l *.x ***or* *.** *n* *.x ***or* *.** mi**t *llow r*mot* *tt**k*rs to *ij**k t** *ut**nti**tion o* sit* **ministr*tors *or r*qu*sts t**t *ownlo** *n* run *il*s wit* *r*itr*ry JSON-*n*o*** *ont*nt, *k* * "r**l**t** *il* *ownl

Reasoning

T** vuln*r**ility (*V*-****-****) involv*s r**l**t** *il* *ownlo**s vi* t** Syst*m mo*ul*. **t** pro**ssin* in *rup*l us*s syst*m_**t**_p***() to **n*l* **t** op*r*tions, w*i** r*turns JSON **t*. I* t*is *n*point *o*sn't *n*or** prop*r *ont*nt-Typ*/*