HTTP: Drupal Core XML-RPC Endpoint Tags Denial of Service

This signature detects attempts to exploit a known vulnerability against Drupal Core XMLRPC Endpoint. A successful attack can result in a denial-of-service condition. The vulnerability is due to an input validation error when XML-RPC endpoint handles an unreasonably large number of tags, which can cause a very high CPU load and memory exhaustion.

Extended Description

The Incutio XML-RPC (IXR) Library, as used in WordPress before 3.9.2 and Drupal 6.x before 6.33 and 7.x before 7.31, does not limit the number of elements in an XML document, which allows remote attackers to cause a denial of service (CPU consumption) via a large document, a different vulnerability than CVE-2014-5265.

Affected Products

Debian debian_linux

References

CVE: CVE-2014-5266

Short Name
HTTP:DOS:DRUPAL-XMLRPC-TAGS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2014-5266 Core Denial Drupal Endpoint Service Tags XML-RPC of
Release Date
09/18/2014
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3812
False Positive
Unknown
Vendors

Drupal

Wordpress

Debian

CVSS Score

5.0

Found a potential security threat?