Bug 1900795 (CVE-2020-13671) - CVE-2020-13671 drupal: improper filename sanitization can lead to remote code execution
Summary: CVE-2020-13671 drupal: improper filename sanitization can lead to remote code...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-13671
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1900796 1900797 1900798
Blocks:
TreeView+ depends on / blocked
 
Reported: 2020-11-23 17:46 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-09-10 13:21 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-09-10 13:21:33 UTC
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2020-11-23 17:46:03 UTC
Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.

Reference:
https://www.drupal.org/sa-core-2020-012

Comment 1 Guilherme de Almeida Suckevicz 2020-11-23 17:46:39 UTC
Created drupal7 tracking bugs for this issue:

Affects: epel-7 [bug 1900798]
Affects: fedora-all [bug 1900797]


Created drupal8 tracking bugs for this issue:

Affects: fedora-all [bug 1900796]

Comment 2 Shawn Iwinski 2021-09-10 04:16:40 UTC
All dependant bugs have been closed... please close this bug


Note You need to log in before you can comment on or make changes to this bug.