Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.148533
Category:Web application abuses
Title:Drupal RCE Vulnerability (SA-CORE-2022-014) - Windows
Summary:Drupal is prone to a remote code execution (RCE); vulnerability.
Description:Summary:
Drupal is prone to a remote code execution (RCE)
vulnerability.

Vulnerability Insight:
Drupal core sanitizes filenames with dangerous extensions upon
upload (reference: SA-CORE-2020-012) and strips leading and trailing dots from filenames to
prevent uploading server configuration files (reference: SA-CORE-2019-010).

However, the protections for these two vulnerabilities previously did not work correctly
together. As a result, if the site were configured to allow the upload of files with an htaccess
extension, these files' filenames would not be properly sanitized. This could allow bypassing the
protections provided by Drupal core's default .htaccess files and possible remote code execution
on Apache web servers.

This issue is mitigated by the fact that it requires a field administrator to explicitly
configure a file field to allow htaccess as an extension (a restricted permission), or a
contributed module or custom code that overrides allowed file uploads.

Affected Software/OS:
Drupal versions 9.x through 9.3.18 and 9.4.x through 9.4.2.

Solution:
Update to version 9.3.19, 9.4.3 or later.

CVSS Score:
8.3

CVSS Vector:
AV:N/AC:L/Au:M/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-25277
https://www.drupal.org/sa-core-2022-014
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.