First published: Wed Jun 21 2017(Updated: )
Drupal core 8 before versions 8.3.4 allows remote attackers to execute arbitrary code due to the PECL YAML parser not handling PHP objects safely during certain operations.
Credit: mlhess@drupal.org mlhess@drupal.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/drupal/core | >=8.0<8.1.0>=8.1.0<8.2.0>=8.2.0<8.3.0>=8.3.0<8.3.4 | |
composer/drupal/drupal | >=8.0<8.1.0>=8.1.0<8.2.0>=8.2.0<8.3.0>=8.3.0<8.3.4 | |
composer/drupal/drupal | >=8.0<8.3.4 | 8.3.4 |
composer/drupal/core | >=8.0<8.3.4 | 8.3.4 |
Drupal | >=8.0.0<8.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6920 is classified as a critical vulnerability due to its ability to allow remote code execution.
To fix CVE-2017-6920, upgrade Drupal core and Drupal to version 8.3.4 or later.
CVE-2017-6920 affects Drupal core versions prior to 8.3.4 including 8.0.x, 8.1.x, and 8.2.x.
CVE-2017-6920 is a remote code execution vulnerability due to unsafe object handling by the PECL YAML parser.
Yes, CVE-2017-6920 can be exploited remotely, allowing attackers to execute arbitrary code on the server.