There are confirmed reports indicating that this vulnerability has been publicly exploited in spam campaigns. The attackers were creating accounts, uploading files with spam links to advertise or influence SEO rankings.
Vulnerable component: Drupal
CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:H/RL:O/RC:C
CWE-ID: CWE-693 - Protection Mechanism Failure
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to insufficient file protection. A remote attacker can bypass access restrictions and view private files that have been uploaded by an anonymous user but not permanently attached to content on the site.
Successful exploitation of the vulnerability may result in access bypass.
Note: The vulnerability was being actively exploited for spam purposes.
Latest references in media:
- Security Affairs newsletter Round 116 тАУ News of the week [2017-06-25 14:20:13]
- Drupal fixes the CVE-2017-6922 flaw exploited in spam campaigns in the wild [2017-06-22 22:20:33]
- Drupal Patches Flaw Exploited in Spam Campaigns [2017-06-22 11:00:19]
Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.