Files
CVEs-PoC/2017/CVE-2017-6920.md
T
2025-09-29 21:09:30 +02:00

35 lines
1.4 KiB
Markdown

### [CVE-2017-6920](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6920)
![](https://img.shields.io/static/v1?label=Product&message=Drupal%20Core&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=8%20prior%20to%208.3.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen)
### Description
Drupal core 8 before versions 8.3.4 allows remote attackers to execute arbitrary code due to the PECL YAML parser not handling PHP objects safely during certain operations.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Awrrays/FrameVul
- https://github.com/CLincat/vulcat
- https://github.com/Micr067/CMS-Hunter
- https://github.com/SecWiki/CMS-Hunter
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/binfed/cms-exp
- https://github.com/cc8700619/poc
- https://github.com/copperfieldd/CMS-Hunter
- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks
- https://github.com/soosmile/cms-V
- https://github.com/superfish9/pt
- https://github.com/t0m4too/t0m4to
- https://github.com/yige666/CMS-Hunter