Language:
https://www.drupal.org/sa-core-2020-013
https://www.drupal.org/node/1173280
https://www.drupal.org/project/drupal/releases/7.75
https://www.drupal.org/project/drupal/releases/8.8.12
Severity: High
ID: 143274
File Name: drupal_9_0_9.nasl
Version: 1.10
Type: remote
Family: CGI abuses
Published: 11/27/2020
Updated: 8/29/2022
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Risk Factor: High
Score: 8.4
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2020-28949
Risk Factor: High
Base Score: 7.8
Temporal Score: 7.5
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/a:drupal:drupal
Required KB Items: installed_sw/Drupal, Settings/ParanoidReport
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 11/25/2020
Vulnerability Publication Date: 11/19/2020
CISA Known Exploited Vulnerability Due Dates: 9/15/2022
Metasploit (PEAR Archive_Tar 1.4.10 Arbitrary File Write)
CVE: CVE-2020-28948, CVE-2020-28949
IAVA: 2020-A-0545-S