This Metasploit module exploits a Drupal property injection in the Forms API. Drupal versions 6.x, less than 7.58, 8.2.x, less than 8.3.9, less than 8.4.6, and less than 8.5.1 are vulnerable.
d8e06fe66e7a7c70257d472a150741719f1392fb6c548c25bee9d61d4f3a78cd
Drupal versions before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
5c56b8bac1e22f18ddbee9eb7490e7405a9c7609ee08978711e532a1abf9716d
Drupal versions prior to 7.58, 8.3.9, 8.4.6, and 8.5.1 Drupalgeddon2 remote code execution proof of concept exploit. Ported to Ruby.
9448745ca34223b272016f3a6b85e742d98115ddc80c24382e74fd677ef4be62
Drupal versions prior to 7.58, 8.3.9, 8.4.6, and 8.5.1 Drupalgeddon2 remote code execution proof of concept exploit.
a695c9b933acab25a89439cdbf074c03cd35f1a81063d2b075445d945989d0f6
Debian Linux Security Advisory 4156-1 - A remote code execution vulnerability has been found in Drupal, a fully-featured content management framework.
4730e5e8eed2ad125870f5a35793232c029da039eaee30cf59d3629a80817783