DETECTION OVERVIEW
Risk Factors
These vulnerabilities are a popular target for attackers because millions of websites run on Drupal. These vulnerabilities are widely known, easy to exploit, and effective. An attacker can quickly take over a website to change web page content, send spam emails, or steal sensitive data. In addition, a compromised web server can create an entry point into the internal network, where an attacker can compromise more workstations and critical assets. These results can have a significant negative effect on the reputation and revenue of an organization.
Kill Chain
Risk Score
83
Older versions of Drupal include a remote code execution (RCE) vulnerability, which allows an attacker to run malicious code on a web server. First, the attacker might run a scan to confirm that a vulnerable version of Drupal is installed on the web server. Next, the attacker submits malicious code within an HTTP POST request. The vulnerable web server does not verify that the POST data is valid user input, so the server runs the malicious code and becomes compromised.
Upgrade Drupal to the most recent versions of 7.x, 8.3.x, 8.4.x or 8.5.x.