CVE-2015-8761

9.0 CRITICAL

📋 TL;DR

This vulnerability in Drupal's Values module allows remote administrators with 'Import value sets' permission to execute arbitrary PHP code via the exported values list in a ctools import. It affects Drupal 7.x sites using Values module versions 7.x-1.x before 7.x-1.2. This is a critical remote code execution vulnerability.

💻 Affected Systems

Products:
  • Drupal Values module
Versions: 7.x-1.x before 7.x-1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Drupal 7.x and the Values module installed. Only affects users with 'Import value sets' permission.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, malware deployment, or complete site takeover.

🟠

Likely Case

Unauthorized PHP code execution leading to data manipulation, backdoor installation, or privilege escalation.

🟢

If Mitigated

Limited impact if proper permission controls and network segmentation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator access with specific permission. Public exploit code exists in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.x-1.2

Vendor Advisory: https://www.drupal.org/node/2622534

Restart Required: No

Instructions:

1. Update Values module to version 7.x-1.2 or later. 2. Apply patch from Drupal security advisory. 3. Clear Drupal caches.

🔧 Temporary Workarounds

Remove Import Permission

all

Temporarily revoke 'Import value sets' permission from all users until patch is applied.

Disable Values Module

linux

Disable the Values module if not essential for site functionality.

drush dis values

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Drupal servers
  • Enable detailed logging and monitoring for suspicious PHP execution attempts

🔍 How to Verify

Check if Vulnerable:

Check Values module version in Drupal admin interface or via 'drush pm-list' command.

Check Version:

drush pm-list | grep values

Verify Fix Applied:

Confirm Values module version is 7.x-1.2 or later and verify patch application.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PHP execution in Drupal logs
  • Suspicious ctools import activities
  • Unauthorized file modifications

Network Indicators:

  • Unexpected outbound connections from Drupal server
  • Suspicious POST requests to ctools import endpoints

SIEM Query:

source="drupal.log" AND ("ctools" AND "import") AND ("php" OR "exec" OR "system")

🔗 References

📤 Share & Export