Mitigation Instructions for CVE-2016-4437
Mitigating CVE-2016-4437: Remote Code Execution Vulnerability in Apache ActiveMQ
1 min read
CyRisk Vulnerability Management Team : Mar 21, 2023 4:45:51 PM
SUBJECT: Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002
TECH STACK: DRUPAL 7.X AND 8.X VERSIONS
DATE(S) ISSUED: MARCH 28, 2018
Criticality: Critical
OVERVIEW:
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised.
THREAT INTELLIGENCE:
This vulnerability is being actively exploited in the wild.
SOLUTION:
Upgrade to the most recent version of Drupal 7 or 8 core.
Drupal 8.3.x and 8.4.x are no longer supported and we don't normally provide security releases for unsupported minor releases. However, given the potential severity of this issue, we are providing 8.3.x and 8.4.x releases that include the fix for sites which have not yet had a chance to update to 8.5.0.
Your site's update report page will recommend the 8.5.x release even if you are on 8.3.x or 8.4.x. Please take the time to update to a supported version after installing this security update.
This issue also affects Drupal 8.2.x and earlier, which are no longer supported. If you are running any of these versions of Drupal 8, update to a more recent release and then follow the instructions above.
This issue also affects Drupal 6. Drupal 6 is End of Life. For more information on Drupal 6 support please contact a D6LTS vendor.
REFERENCES:
Drupal.org:
Mitigating CVE-2016-4437: Remote Code Execution Vulnerability in Apache ActiveMQ
Mitigating CVE-2013-1896: Privilege Escalation Vulnerability in Puppet
Subject: Mitigating CVE-2014-6271: Shellshock Vulnerability in Bash