module
Drupal HTTP Parameter Key/Value SQL Injection
Disclosed | Created |
---|---|
10/15/2014 | 05/30/2018 |
Disclosed
10/15/2014
Created
05/30/2018
Description
This module exploits the Drupal HTTP Parameter Key/Value SQL Injection
(aka Drupageddon) in order to achieve a remote shell on the vulnerable
instance. This module was tested against Drupal 7.0 and 7.31 (was fixed
in 7.32).
Two methods are available to trigger the PHP payload on the target:
- set TARGET 0:
Form-cache PHP injection method (default).
This uses the SQLi to upload a malicious form to Drupal's cache,
then trigger the cache entry to execute the payload using a POP chain.
- set TARGET 1:
User-post injection method.
This creates a new Drupal user, adds it to the administrators group,
enable Drupal's PHP module, grant the administrators the right to
bundle PHP code in their post, create a new post containing the
payload and preview it to trigger the payload execution.
(aka Drupageddon) in order to achieve a remote shell on the vulnerable
instance. This module was tested against Drupal 7.0 and 7.31 (was fixed
in 7.32).
Two methods are available to trigger the PHP payload on the target:
- set TARGET 0:
Form-cache PHP injection method (default).
This uses the SQLi to upload a malicious form to Drupal's cache,
then trigger the cache entry to execute the payload using a POP chain.
- set TARGET 1:
User-post injection method.
This creates a new Drupal user, adds it to the administrators group,
enable Drupal's PHP module, grant the administrators the right to
bundle PHP code in their post, create a new post containing the
payload and preview it to trigger the payload execution.
Authors
SektionEinsWhiteWinterWolfChristian Mehlmauer Brandon Perry
Platform
PHP
Architectures
php
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:
msf > use exploit/multi/http/drupal_drupageddon msf /(n) > show actions ...actions... msf /(n) > set ACTION < action-name > msf /(n) > show options ...show and set options... msf /(n) > run

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.