I have read the security notices and understand that it "would allow an attacker to reinstall an existing Drupal site with an external database server and then execute custom PHP code". According to Drupal, "re-installation can only be successful if the site's settings.php
file or sites directories are writeable by or owned by the webserver user."
I tried to Google for a better explanation as to how an attacker would exploit the install.php
file but couldn't find any. I understand that there is a patch and a few quick fixes like the following;
<Files install.php>
Order allow,deny
ErrorDocument 403 "Access denied."
</Files>
But what I want to know it, What is the process to exploit DRUPAL-SA-CORE-2012-003?
(Would like a working example to be able to run on my test site)