• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Drupal Exploit Attempt - [Multiple CVEs]

Risk Factors

These vulnerabilities are a popular target for attackers because millions of websites run on Drupal. These vulnerabilities are widely known, easy to exploit, and effective. An attacker can quickly take over a website to change web page content, send spam emails, or steal sensitive data. In addition, a compromised web server can create an entry point into the internal network, where an attacker can compromise more workstations and critical assets. These results can have a significant negative effect on the reputation and revenue of an organization.

Kill Chain

Exploitation

Risk Score

83

Detection diagram
Next in Exploitation: EternalBlue Exploit

Attack Background

Older versions of Drupal include a remote code execution (RCE) vulnerability, which allows an attacker to run malicious code on a web server. First, the attacker might run a scan to confirm that a vulnerable version of Drupal is installed on the web server. Next, the attacker submits malicious code within an HTTP POST request. The vulnerable web server does not verify that the POST data is valid user input, so the server runs the malicious code and becomes compromised.

Mitigation Options

Upgrade Drupal to the most recent versions of 7.x, 8.3.x, 8.4.x or 8.5.x.

MITRE ATT&CK ID

What else can RevealX do for you?