Tag Archive for: Drupal

Personal Internet Security Basics



Drupal issues emergency fix for critical bug with known exploits


Drupal issues emergency fix for critical bug with known exploits

Drupal has released emergency security updates to address a critical vulnerability with known exploits that could allow for arbitrary PHP code execution on some CMS versions.

“According to the regular security release window schedule, November 25th would not typically be a core security window,” Drupal said.

“However, this release is necessary because there are known exploits for one of core’s dependencies and some configurations of Drupal are vulnerable.”

Right now, over 944,000 websites are using vulnerable Drupal versions out of a total of 1,120,941 according to official stats. “These statistics are incomplete; only Drupal websites using the Update Status module are included in the data,” Drupal says.

Drupal is also used by 2.5% of all websites with content management systems, making it the fourth most popular CMS on the Internet, after WordPress (63.8%), Shopify (5.1%), and Joomla (3.6%).

Security updates for all affected versions

According to Drupal’s security advisory, the vulnerability is caused by two bugs in the PEAR Archive_Tar library used by the content management system (CMS) tracked as CVE-2020-28948 and CVE-2020-28949.

The critical Drupal code execution vulnerability can be exploited if the CMS is configured to allow and process .tar, .tar.gz, .bz2, or .tlz file uploads.

Multiple Drupal security updates were issued to fix the bug and to allow admins to quickly patch their servers to protect them from potential attacks.

Drupal recommends installing the following updates on affected servers:

“Versions of Drupal 8 prior to 8.8.x are end-of-life and do not receive security coverage,” Drupal’s security team said.

Mitigation measures also available

Mitigation measures are also available for admins who cannot immediately update the Drupal installation on their servers.

To do that, site admins are advised to block untrusted users from uploading .tar, .tar.gz, .bz2, or .tlz files to temporarily mitigate the issue.

Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert today urging admins and users to upgrade to the patched Drupal versions.

Last week, Drupal patched another critical remote code…

Source…

Drupal fixes bug that allow hackers to access vulnerable websites


Drupal, a leading content management service (CMS) platform, has fixed a critical bug that could allow hackers to gain access over vulnerable websites.
Drupal developer
Drupal is currently the fourth most used content management service (CMS) platform on Internet after WordPress, Shopify and Joomla.

Drupal’s engineering team this week released security updates to patch the critical vulnerability, reports ZDNet.

Tracked as CVE-2020-13671, the vulnerability is easy to exploit and relies on double extension trick.

Attackers can add a second extension to a malicious file, upload it on a Drupal site through open upload fields, and have the malicious executed.

The Drupal team said the vulnerability the CMS does not sanitize certain file names, allowing some malicious files to slip through.

This can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations.

Last month, the cyber security researchers unearthed a massive botnet network called KashmirBlack, being run from Indonesia, that has attacked websites running popular content management systems (CMSs) like WordPress, Drupal and Joomla, among others.

The sophisticated botnet is believed to have infected hundreds of thousands of websites by attacking their underlying CMS platforms, according to US-based cyber security form Imperva.

The botnet’s primary purpose appears to infect websites, and then use their servers for cryptocurrency mining.

Based in Indonesia, the hackers have a command-and-control (C&C) infrastructure to operate KashmirBlack.

Source…

Three-month-old Drupal vulnerability is being used to deploy cryptojacking malware

  1. Three-month-old Drupal vulnerability is being used to deploy cryptojacking malware  ZDNet
  2. Monero-mining Drupal malware targets network systems  SC Magazine
  3. Monero [XMR] Mining Malware in Action with Drupal Vulnerability Exploitation  Coingape
  4. Full coverage

malware news – read more