First published: Wed Nov 18 2020(Updated: )
Drupal core - Critical - Remote code execution - SA-CORE-2020-012
Credit: mlhess@drupal.org mlhess@drupal.org mlhess@drupal.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/drupal/core | >=7.0.0<7.74>=8.0.0<8.1.0>=8.1.0<8.2.0>=8.2.0<8.3.0>=8.3.0<8.4.0>=8.4.0<8.5.0>=8.5.0<8.6.0>=8.6.0<8.7.0>=8.7.0<8.8.0>=8.8.0<8.8.11>=8.9.0<8.9.9>=9.0.0<9.0.8 | |
composer/drupal/drupal | >=7.0.0<7.74>=8.0.0<8.1.0>=8.1.0<8.2.0>=8.2.0<8.3.0>=8.3.0<8.4.0>=8.4.0<8.5.0>=8.5.0<8.6.0>=8.6.0<8.7.0>=8.7.0<8.8.0>=8.8.0<8.8.11>=8.9.0<8.9.9>=9.0.0<9.0.8 | |
Drupal Drupal | >=7.0<7.74 | |
Drupal Drupal | >=8.8<8.8.11 | |
Drupal Drupal | >=8.9<8.9.9 | |
Drupal Drupal | >=9.0<9.0.8 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Drupal Drupal Core | ||
composer/drupal/drupal | >=9.0.0<9.0.8 | 9.0.8 |
composer/drupal/drupal | >=8.9.0<8.9.9 | 8.9.9 |
composer/drupal/drupal | >=8.0.0<8.8.11 | 8.8.11 |
composer/drupal/drupal | >=7.0.0<7.74 | 7.74 |
composer/drupal/core | >=7.0.0<7.74 | 7.74 |
composer/drupal/core | >=8.0.0<8.8.11 | 8.8.11 |
composer/drupal/core | >=8.9.0<8.9.9 | 8.9.9 |
composer/drupal/core | >=9.0.0<9.0.8 | 9.0.8 |
debian/drupal7 | ||
ubuntu/drupal7 | <7.26-1ubuntu0.1+ | 7.26-1ubuntu0.1+ |
ubuntu/drupal7 | <7.74 | 7.74 |
ubuntu/drupal7 | <7.44-1ubuntu1~16.04.0+ | 7.44-1ubuntu1~16.04.0+ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13671 is high, with a severity value of 8.8.
CVE-2020-13671 affects Drupal core versions prior to 9.0.8.
The impact of CVE-2020-13671 is the incorrect interpretation of uploaded files, leading to serving files with the wrong MIME type or executing them as PHP.
To fix CVE-2020-13671 in Drupal, you need to upgrade to Drupal core version 9.0.8.
You can find more information about CVE-2020-13671 on the Drupal website and the NIST NVD website.