CVE-2017-6920:
Drupal PECL YAML parser unsafe object handling
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.98473%
CWE
Published
5/14/2022
Updated
4/23/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
drupal/core | composer | >= 8.0, < 8.3.4 | 8.3.4 |
drupal/drupal | composer | >= 8.0, < 8.3.4 | 8.3.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Drupal's YAML parser implementation using the PECL extension. The YamlPecl::parse method directly uses yaml_parse() which by default allows PHP object deserialization. Before Drupal 8.3.4, this implementation lacked the YAML_BYTE_ESCAPED flag that prevents object deserialization. Attackers could craft malicious YAML payloads with PHP object tags that would be deserialized, enabling arbitrary code execution through PHP object injection vulnerabilities.