UBUNTU-CVE-2017-6381

Source
https://ubuntu.com/security/CVE-2017-6381
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-6381.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-6381
Related
Published
2017-03-16T14:59:00Z
Modified
2024-10-15T14:06:16Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A 3rd party development library including with Drupal 8 development dependencies is vulnerable to remote code execution. This is mitigated by the default .htaccess protection against PHP execution, and the fact that Composer development dependencies aren't normal installed. You might be vulnerable to this if you are running a version of Drupal before 8.2.2. To be sure you aren't vulnerable, you can remove the <siteroot>/vendor/phpunit directory from your production deployments

References

Affected packages

Ubuntu:Pro:14.04:LTS / drupal7

Package

Name
drupal7
Purl
pkg:deb/ubuntu/drupal7?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*

7.23-1
7.24-1
7.24-2
7.26-1
7.26-1ubuntu0.1
7.26-1ubuntu0.1+esm1
7.26-1ubuntu0.1+esm2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:16.04:LTS / drupal7

Package

Name
drupal7
Purl
pkg:deb/ubuntu/drupal7?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*

7.38-1
7.41-1
7.44-1ubuntu1~16.04.0
7.44-1ubuntu1~16.04.0+esm1
7.44-1ubuntu1~16.04.0+esm2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}