{"id":9094,"date":"2019-08-05T08:00:29","date_gmt":"2019-08-05T08:00:29","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9094"},"modified":"2026-04-17T18:07:52","modified_gmt":"2026-04-17T18:07:52","slug":"drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/","title":{"rendered":"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>1 Vulnerability Description<\/strong><\/h2>\n<p>Recently, Drupal released a security advisory on the remediation of an access bypass vulnerability (CVE-2019-6342). In Drupal 8.7.4, when the experimental Workspaces module is enabled, an access bypass condition is created. In terms of the security risk, Drupal rates the vulnerability as Critical.<!--more--><\/p>\n<p>Reference:<\/p>\n<p>https:\/\/www.drupal.org\/sa-core-2019-008<\/p>\n<h2><strong>2 Scope of Impact<\/strong><\/h2>\n<ul>\n<li>Affected Versions<\/li>\n<li>Drupal 8.7.4\n<ul>\n<li>Unaffected Versions<\/li>\n<\/ul>\n<\/li>\n<li>Drupal 8.7.5<\/li>\n<li>Drupal &lt; 8.7.4<\/li>\n<li>Drupal 8.6.x<\/li>\n<\/ul>\n<h2><strong>3 Vulnerability Detection<\/strong><\/h2>\n<p>Drupal users can check whether they are affected by this vulnerability by logging in to the background and choosing <strong>Manage &gt; Reports &gt; Status report<\/strong> to view the version of the current application. If the version is 8.7.4, they are at risk.<\/p>\n<p><strong><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9095\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"597\" height=\"307\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-1.jpg 597w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-1-300x154.jpg 300w\" sizes=\"(max-width: 597px) 100vw, 597px\" \/><\/a><br \/>\n<\/strong><\/p>\n<h2><strong>4 Mitigation<\/strong><\/h2>\n<h3><strong>4.1 Official Fix<\/strong><\/h3>\n<p>Drupal has released a new version to fix this vulnerability. Affected users can visit the following link to download this version and upload their installation:<\/p>\n<p>https:\/\/www.drupal.org\/project\/drupal\/releases\/8.7.5<\/p>\n<h2><strong>5 Technical Analysis<\/strong><\/h2>\n<h3><strong>5.1 Vulnerability Reproduction<\/strong><\/h3>\n<p>Install Drupal 8.7.4, log in as <strong>admin<\/strong>, access <strong>\/admin\/modules<\/strong>, select <strong>Workspaces<\/strong>, and click <strong>Install<\/strong>.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9096\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"534\" height=\"263\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-2.jpg 534w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-2-300x148.jpg 300w\" sizes=\"(max-width: 534px) 100vw, 534px\" \/><\/a><\/p>\n<p>If a message shown in the following page appears in the upper right corner, the installation succeeds. You can switch between the Stage and Live mode.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9097\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"542\" height=\"117\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-3.jpg 542w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-3-300x65.jpg 300w\" sizes=\"(max-width: 542px) 100vw, 542px\" \/><\/a><\/p>\n<p>Use another browser to open the homepage of Drupal without logging in, and access <a href=\"http:\/\/127.0.0.1\/drupal-8.7.4\/node\/add\/article\">http:\/\/127.0.0.1\/drupal-8.7.4\/node\/add\/article<\/a>. On this page, you can directly add arbitrary articles without being required to have the author or administrator privileges.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9098\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"525\" height=\"240\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-4.jpg 525w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-4-300x137.jpg 300w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/a><\/p>\n<h3><strong>5.2 Vulnerability Analysis<\/strong><\/h3>\n<p>Workspaces is a new experimental module built into the Drupal 8.6 core. It allows website administrators to review and edit the content and then publish unlimited amounts of it all at once.<\/p>\n<p>Workspaces can work in Stage or Live mode, with Live as the default one. The differences between the two modes are as follows:<\/p>\n<ul>\n<li>When Workspaces is in Stage mode, the edited content is not immediately updated. After all articles are edited, the administrator can publish them to the live environment by clicking <strong>Deploy to Live<\/strong>. That is to say, the Stage workspace is equivalent to a temporary depot.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9099\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-5.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"205\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-5.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-5-300x116.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<ul>\n<li>The Live workspace is characterized by instant updates. That is to say, when an article is edited, the website content is immediately updated.<\/li>\n<\/ul>\n<p>In either mode, there is a bug caused by incorrect coding: An anonymous user can create, publish, edit, and delete articles without login. The vulnerability stems from the authentication module EntityAccess.<\/p>\n<p>When a user initiates a request, the system calls back the privilege check module to check the current user&#8217;s permissions. Specifically, in the RouterListener method of EventListener, the onKernelRequest() method calls the matchRequest() method of the AccessAwareRouter class, and then calls the checkRequest() method of the AccessManager class. Finally, in the performCheck() method of the AccessManager class, the call_user_func_array function calls back the corresponding operation for a specific permission check.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9100\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-6.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"605\" height=\"138\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-6.jpg 605w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-6-300x68.jpg 300w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p>For example, access_check.node.add is called back when an article is published. The related method is defined in the NodeAccessControlHandler controller, which is inherited from EntityAccessControlHandler. In the createAccess() method of the parent class, the create_access permission for the corresponding operation is called back. In this process, the module name and related hook are spliced to constitute a callback function.<\/p>\n<p><em>$function = $module . &#8216;_&#8217; . $hook<\/em><\/p>\n<p>Here the workspaces_entity_create_access() method is called back to enter Workspaces.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9101\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-7.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"605\" height=\"138\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-7.jpg 605w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-7-300x68.jpg 300w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/p>\n<p>When the entityCreateAccess() method is called, there exists a key operation, bypassAccessResult.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9102\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-8.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"614\" height=\"142\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-8.jpg 614w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-8-300x69.jpg 300w\" sizes=\"(max-width: 614px) 100vw, 614px\" \/><\/a><\/p>\n<p>The bypassAccessResult() method checks whether the current user has the &#8220;bypass node access&#8221; and is specific to Workspaces. This method determines that &#8220;if a user is in his\/her own active workspace, he\/she has a full permission&#8221;. &#8220;Full permission&#8221; here refers to addition, deletion, and edit operations on articles.<\/p>\n<p>This looks odd, but is actually a designed function. Normally, whether a user owns a full permission is configured in admin\/people\/permissions in the background. By default, anonymous and non-administrative authenticated users do not have such permission.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9103\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"581\" height=\"357\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-9.jpg 581w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-9-300x184.jpg 300w\" sizes=\"(max-width: 581px) 100vw, 581px\" \/><\/a><\/p>\n<p>Only when &#8220;Bypass content entity access in own workspace&#8221; is enabled, can users publish and delete articles without logging in. The vulnerability in question bypasses this configuration, allowing privilege escalation by default.<\/p>\n<p>Let&#8217;s look further into how bypassAccessResult() is implemented. In the process, the AccessResultAllowed object or AccessResultNeutral object is returned. &#8220;Neutral&#8221; means that the result may need to be further determined subsequently. However, as far as this vulnerability is concerned, the result is just &#8220;access&#8221; or &#8220;forbidden&#8221;.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9104\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"638\" height=\"141\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-10.jpg 638w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-10-300x66.jpg 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/a><\/p>\n<p>The method first obtains the current active workspace, then determines via allowedIf whether the current user has the permission, and finally saves this data to the cache, including the cached content, cache label, and expiration time. Subsequently, the method determines whether to create an allowed access result depending on whether the permission is present via allowedIfHasPermission. If the permission is not present, the user is not allowed access and a reason is provided. This mechanism works well by far. When no workspace permission is configured for anonymous users in the background, the AccessResultNeutral object is returned, indicating &#8220;forbidden&#8221;. Now comes the vulnerable part.<\/p>\n<p><em>$owner_has_access-&gt;orIf($access_bypass);<\/em><\/p>\n<p>By checking the patch, we find that, in the preceding statement, orIf is changed to andIf.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9105\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-11.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"651\" height=\"222\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-11.jpg 651w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-11-300x102.jpg 300w\" sizes=\"(max-width: 651px) 100vw, 651px\" \/><\/a><\/p>\n<p>The design logic of the two methods is rather complicated. Their most important function is to make a judgment on the &#8220;Neutral&#8221; result. In the case of orIf, whether to allow access is up to the caller&#8217;s decision. In the case of andIf, access is directly prohibited.<\/p>\n<p>As far as this vulnerability is concerned, the difference is shown in the following figures.<\/p>\n<ul>\n<li>orIf()<\/li>\n<\/ul>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-12.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9106\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-12.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"641\" height=\"209\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-12.jpg 641w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-12-300x98.jpg 300w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/a><\/p>\n<p>The AccessResultAllowed object is returned.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9107\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-13.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"621\" height=\"214\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-13.jpg 621w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-13-300x103.jpg 300w\" sizes=\"(max-width: 621px) 100vw, 621px\" \/><\/p>\n<ul>\n<li>andIf()<\/li>\n<\/ul>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-14.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9108\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-14.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"634\" height=\"233\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-14.jpg 634w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-14-300x110.jpg 300w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/><\/a><\/p>\n<p>The AccessResultNeutral object is returned.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-15.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9109\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-15.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"631\" height=\"204\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-15.jpg 631w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-15-300x97.jpg 300w\" sizes=\"(max-width: 631px) 100vw, 631px\" \/><\/a><\/p>\n<p>After the check is complete, we come back to the checkAccess() method of the AccessAwareRouter class. This method checks the returned result and so isAllowed() of AccessResultNeutral throws an exception.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-16.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9110\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-16.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"659\" height=\"245\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-16.jpg 659w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-16-300x112.jpg 300w\" sizes=\"(max-width: 659px) 100vw, 659px\" \/><\/a><\/p>\n<p>On the page, a 403 Forbidden error is displayed, indicating access denied.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-17.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9111\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-17.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"676\" height=\"268\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-17.jpg 676w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0805-17-300x119.jpg 300w\" sizes=\"(max-width: 676px) 100vw, 676px\" \/><\/a><\/p>\n<p>The related call stack is as follows:<\/p>\n<p><em>Drupal\\workspaces\\EntityAccess-&gt;bypassAccessResult()<\/em><\/p>\n<p><em>Drupal\\workspaces\\EntityAccess-&gt;entityCreateAccess()<\/em><\/p>\n<p><em>&acirc;&euro;&brvbar;<\/em><\/p>\n<p><em>Drupal\\Core\\Extension\\ModuleHandler-&gt;invokeAll()<\/em><\/p>\n<p><em>Drupal\\node\\NodeAccessControlHandler-&gt;createAccess()<\/em><\/p>\n<p><em>Drupal\\node\\Access\\NodeAddAccessCheck-&gt;access()<\/em><\/p>\n<p><em>Drupal\\Core\\Access\\AccessManager-&gt;performCheck()<\/em><\/p>\n<p><em>Drupal\\Core\\Routing\\AccessAwareRouter-&gt;checkAccess()<\/em><\/p>\n<p><em>Drupal\\Core\\Routing\\AccessAwareRouter-&gt;matchRequest()<\/em><\/p>\n<p><em>Symfony\\Component\\HttpKernel\\EventListener\\RouterListener-&gt;onKernelRequest()<\/em><\/p>\n<p><em>&acirc;&euro;&brvbar;<\/em><\/p>\n<p><em>DrupalKernel.php:693, Drupal\\Core\\DrupalKernel-&gt;handle()<\/em><\/p>\n<p><em>index.php:19, {main}()<\/em><\/p>\n<h3><strong>5.3 Summary<\/strong><\/h3>\n<p>This vulnerability stems from a slip in the design process. When no permission is granted in the default configuration, users can bypass access to publish, delete, or edit articles. However, as this vulnerability affects only Drupal 8.7.4 and can be exploited only when the Workspaces module (experimental function) is enabled, which is disabled by default, its impact is quite limited. Users can mitigate the impact of this vulnerability by upgrading their Drupal or disabling the Workspaces module.<\/p>\n<h2><strong>Appendix<\/strong><\/h2>\n<ul>\n<li>\n<h3><strong>Statement<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS..<\/p>\n<ul>\n<li>\n<h3><strong>About NSFOCUS<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<br \/>\nNSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<br \/>\nA wholly owned subsidiary of NSFOCUS Information Technology Co. Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 Vulnerability Description Recently, Drupal released a security advisory on the remediation of an access bypass vulnerability (CVE-2019-6342). In Drupal 8.7.4, when the experimental Workspaces module is enabled, an access bypass condition is created. In terms of the security risk, Drupal rates the vulnerability as Critical.<\/p>\n","protected":false},"author":1,"featured_media":8179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[388],"class_list":["post-9094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-drupal"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"1 Vulnerability Description Recently, Drupal released a security advisory on the remediation of an access bypass vulnerability (CVE-2019-6342). In Drupal\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-05T08:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/03\/Drupal.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"1 Vulnerability Description Recently, Drupal released a security advisory on the remediation of an access bypass vulnerability (CVE-2019-6342). In Drupal\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/03\/Drupal.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis\",\"datePublished\":\"2019-08-05T08:00:29+00:00\",\"dateModified\":\"2026-04-17T18:07:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/\"},\"wordCount\":1341,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Drupal.jpg\",\"keywords\":[\"Drupal\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/\",\"name\":\"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Drupal.jpg\",\"datePublished\":\"2019-08-05T08:00:29+00:00\",\"dateModified\":\"2026-04-17T18:07:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Drupal.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Drupal.jpg\",\"width\":464,\"height\":206,\"caption\":\"Drupal logo with blue droplet design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis - NSFOCUS","og_description":"1 Vulnerability Description Recently, Drupal released a security advisory on the remediation of an access bypass vulnerability (CVE-2019-6342). In Drupal","og_url":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/","og_site_name":"NSFOCUS","article_published_time":"2019-08-05T08:00:29+00:00","article_modified_time":"2026-04-17T18:07:52+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/03\/Drupal.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis - NSFOCUS","twitter_description":"1 Vulnerability Description Recently, Drupal released a security advisory on the remediation of an access bypass vulnerability (CVE-2019-6342). In Drupal","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/03\/Drupal.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis","datePublished":"2019-08-05T08:00:29+00:00","dateModified":"2026-04-17T18:07:52+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/"},"wordCount":1341,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/03\/Drupal.jpg","keywords":["Drupal"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/","url":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/","name":"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/03\/Drupal.jpg","datePublished":"2019-08-05T08:00:29+00:00","dateModified":"2026-04-17T18:07:52+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/03\/Drupal.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/03\/Drupal.jpg","width":464,"height":206,"caption":"Drupal logo with blue droplet design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/drupal-access-bypass-vulnerability-cve-2019-6342-technical-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Drupal Access Bypass Vulnerability (CVE-2019-6342) Technical Analysis"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9094"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9094\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8179"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}