CVE-2019-6340
Drupal core - Highly critical - Remote Code Execution
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 15, 2019
- Published Date
- February 21, 2019
- Last Updated
- February 07, 2025
- Vendor
- Drupal
- Product
- Drupal Core
- Description
- Some field types do not properly sanitize data from non-form sources in Drupal 8.5.x before 8.5.11 and Drupal 8.6.x before 8.6.10. This can lead to arbitrary PHP code execution in some cases. A site is only affected by this if one of the following conditions is met: The site has the Drupal 8 core RESTful Web Services (rest) module enabled and allows PATCH or POST requests, or the site has another web services module enabled, like JSON:API in Drupal 8, or Services or RESTful Web Services in Drupal 7. (Note: The Drupal 7 Services module itself does not require an update at this time, but you should apply other contributed updates associated with this advisory if Services is in use.)
- Tags
- Exploitation
- active
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-03-25 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/drupal_restws_unserialize.rb | 2025-04-29 11:01:27 UTC |
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-6340.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
drupal_restws_unserialize
Type: metasploit • Created: Unknown
nobodyatall648/CVE-2019-6340
Type: github • Created: 2021-05-01 15:00:34 UTC • Stars: 0
jas502n/CVE-2019-6340
Type: github • Created: 2019-05-27 19:06:14 UTC • Stars: 70
oways/CVE-2019-6340
Type: github • Created: 2019-02-25 07:47:16 UTC • Stars: 12
DevDungeon/CVE-2019-6340-Drupal-8.6.9-REST-Auth-Bypass
Type: github • Created: 2019-02-25 03:38:47 UTC • Stars: 2
knqyf263/CVE-2019-6340
Type: github • Created: 2019-02-23 13:28:58 UTC • Stars: 43
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Proof of Concept Exploit Available
-
Added to KEVIntel
-
Detected by Nuclei
-
Detected by Metasploit