CVE-2024-13264

9.8 CRITICAL

📋 TL;DR

This vulnerability in Drupal's Opigno module allows attackers to inject malicious PHP code through static code injection, leading to local file inclusion. Attackers can potentially execute arbitrary code on affected Drupal sites. All sites using vulnerable versions of the Opigno module are affected.

💻 Affected Systems

Products:
  • Drupal Opigno module
Versions: from 0.0.0 before 3.1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal installations with Opigno module enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing arbitrary code execution, data theft, and complete system takeover.

🟠

Likely Case

Unauthenticated attackers executing PHP code to read sensitive files, modify content, or create backdoors.

🟢

If Mitigated

Limited impact if proper web application firewalls and file permission controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Static code injection vulnerabilities are typically easy to exploit once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.2

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-028

Restart Required: No

Instructions:

1. Update Opigno module to version 3.1.2 or later via Drupal's update manager. 2. Clear Drupal caches. 3. Verify module functionality.

🔧 Temporary Workarounds

Disable Opigno module

linux

Temporarily disable the vulnerable module until patching is possible

drush pm-disable opigno

🧯 If You Can't Patch

  • Implement strict web application firewall rules to block PHP file inclusion attempts
  • Restrict file system permissions and disable PHP execution in upload directories

🔍 How to Verify

Check if Vulnerable:

Check Opigno module version in Drupal admin interface or via 'drush pm-list | grep opigno'

Check Version:

drush pm-list --fields=name,version | grep opigno

Verify Fix Applied:

Confirm Opigno module version is 3.1.2 or higher and test module functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual PHP file inclusion attempts in web server logs
  • Suspicious requests to Opigno module endpoints

Network Indicators:

  • HTTP requests with PHP file paths in parameters
  • Unexpected file read operations

SIEM Query:

web_access_logs WHERE uri CONTAINS '.php' AND (uri CONTAINS 'opigno' OR params CONTAINS 'file=')

🔗 References

📤 Share & Export