Multiple vulnerabilities were discovered in Drupal core.
Arbitrary PHP code execution
A bug in the installer code was identified that allows an attacker to re-install Drupal using an external database server under certain transient conditions. This could allow the attacker to execute arbitrary PHP code on the original server.
Information disclosure - OpenID module
For sites using the core OpenID module, an information disclosure vulnerability was identified that allows an attacker to read files on the local filesystem by attempting to log in to the site using a malicious OpenID server.
Install the latest version:
If you use Drupal 7.x, upgrade to Drupal core 7.16.
If you are unable to deploy the security release immediately, removing or blocking access to install.php is a sufficient mitigation step for the arbitrary PHP code execution vulnerability.
- ThinkPHP v5.0.22/5.1.29 Remote Code Execution Vulnerability
- WordPress Plugin Statistics Remote Code Execution (1.8)
- WordPress Plugin WP-Property-WordPress Powered Real Estate and Property Management Information Disclosure (220.127.116.11)
- Moveable Type 4.x unauthenticated remote command execution
- Unencrypted __VIEWSTATE parameter