This Metasploit module exploits a PHP unserialize() vulnerability in Drupal RESTful Web Services by sending a crafted request to the /node REST endpoint. As per SA-CORE-2019-003, the initial remediation was to disable POST, PATCH, and PUT, but Ambionics discovered that GET was also vulnerable (albeit cached). Cached nodes can be exploited only once.
f0577a61447bee5c1e01e80e2168cbe148e2d1b04abd7c1f41da56482db6d02b
Drupal versions 8.6.9 and below REST service remote code execution proof of concept exploit.
ad87476e73c4518d71a3cd360572f91df08082c7b7e3106638e51ea716e9a116
Drupal versions prior to 8.6.10 and 8.5.11 suffer from a REST module remote code execution vulnerability.
ae19653ae86e19e4205093659570141a9094d9c26cd09af8cb1673c93f03dc72