{"containers":{"cna":{"affected":[{"product":"Drupal Core","vendor":"Drupal","versions":[{"status":"affected","version":"9.0 versions prior to 9.0.8"},{"status":"affected","version":"8.9 versions prior to 8.9.9"},{"status":"affected","version":"8.8 versions prior to 8.8.11"},{"status":"affected","version":"7 versions prior to 7.74"}]}],"descriptions":[{"lang":"en","value":"Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74."}],"problemTypes":[{"descriptions":[{"description":"Remote code execution","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-12-15T03:06:07.000Z","orgId":"2c85b837-eb8b-40ed-9d74-228c62987387","shortName":"drupal"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.drupal.org/sa-core-2020-012"},{"name":"FEDORA-2020-6f1079934c","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/"},{"name":"FEDORA-2020-d50d74d6f2","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@drupal.org","ID":"CVE-2020-13671","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Drupal Core","version":{"version_data":[{"version_value":"9.0 versions prior to 9.0.8"},{"version_value":"8.9 versions prior to 8.9.9"},{"version_value":"8.8 versions prior to 8.8.11"},{"version_value":"7 versions prior to 7.74"}]}}]},"vendor_name":"Drupal"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Remote code execution"}]}]},"references":{"reference_data":[{"name":"https://www.drupal.org/sa-core-2020-012","refsource":"CONFIRM","url":"https://www.drupal.org/sa-core-2020-012"},{"name":"FEDORA-2020-6f1079934c","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/"},{"name":"FEDORA-2020-d50d74d6f2","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T12:25:16.218Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.drupal.org/sa-core-2020-012"},{"name":"FEDORA-2020-6f1079934c","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/"},{"name":"FEDORA-2020-d50d74d6f2","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2020-13671","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-07T12:38:31.133573Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-01-18","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-13671"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-13671","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type"}]}],"timeline":[{"time":"2022-01-18T00:00:00.000Z","lang":"en","value":"CVE-2020-13671 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:35:32.528Z"}}]},"cveMetadata":{"assignerOrgId":"2c85b837-eb8b-40ed-9d74-228c62987387","assignerShortName":"drupal","cveId":"CVE-2020-13671","datePublished":"2020-11-20T15:40:39.000Z","dateReserved":"2020-05-28T00:00:00.000Z","dateUpdated":"2025-10-21T23:35:32.528Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}