Drupal core contains a potential PHP Object Injection vulnerability
High severity
GitHub Reviewed
Published
Dec 10, 2024
to the GitHub Advisory Database
•
Updated Dec 10, 2024
Package
Affected versions
>= 8.8.0, < 10.2.11
>= 10.3.0, < 10.3.9
>= 7.0, < 7.102
Patched versions
10.2.11
10.3.9
7.102
>= 8.8.0, < 10.2.11
>= 10.3.0, < 10.3.9
>= 7.0, < 7.102
10.2.11
10.3.9
7.102
>= 8.8.0, < 10.2.11
>= 10.3.0, < 10.3.9
>= 7.0, < 7.102
10.2.11
10.3.9
7.102
Description
Published by the National Vulnerability Database
Dec 10, 2024
Published to the GitHub Advisory Database
Dec 10, 2024
Reviewed
Dec 10, 2024
Last updated
Dec 10, 2024
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable.
This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to
unserialize()
. There are no such known exploits in Drupal core.To help protect against this potential vulnerability, some additional checks have been added to Drupal core's database code. If you use a third-party database driver, check the release notes for additional configuration steps that may be required in certain cases.
This issue affects Drupal Core: from 7.0 before 7.102, from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9.
References