GHSA-j66p-fvp2-fxhj:
Drupal core Arbitrary PHP code execution
7.8
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
5/15/2024
Updated
5/15/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
drupal/drupal | composer | >= 7.0.0, < 7.75 | 7.75 |
drupal/drupal | composer | >= 8.0.0, < 8.8.12 | 8.8.12 |
drupal/drupal | composer | >= 8.9.0, < 8.9.10 | 8.9.10 |
drupal/drupal | composer | >= 9.0.0, < 9.0.9 | 9.0.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from Drupal's use of a vulnerable PEAR Archive_Tar library version. The Tar archiver component (Drupal\Component\Archiver\Tar) directly interacts with this library. Its extract() method calls Archive_Tar::extract(), which had directory traversal and symlink vulnerabilities. When Drupal processes user-uploaded archives through this component (common in core/modules/file or update manager), it enables attackers to write arbitrary files - including PHP payloads - to the filesystem. The connection between Archive_Tar vulnerabilities and Drupal's file processing architecture makes Tar::extract() the primary vulnerable entry point.