TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentral TechCentral
    NEWSLETTER
    • News

      Google’s Equiano cable lands in Namibia

      3 July 2022

      More stage-6 load shedding on the cards for this week

      3 July 2022

      Load shedding nears previous annual record – with six months to go

      3 July 2022

      Unlawful Eskom strike costing South Africa three stages of load shedding

      1 July 2022

      Striking Eskom workers will face consequences: De Ruyter

      1 July 2022
    • World

      EU to impose wide-ranging new rules on the crypto industry

      3 July 2022

      Crypto hedge fund Three Arrows files for bankruptcy

      3 July 2022

      Meta girds for ‘fierce’ headwinds

      1 July 2022

      Graphics card prices plummet as crypto demand dries up

      30 June 2022

      Bitcoin just had its worst quarter in a decade

      30 June 2022
    • In-depth

      The NFT party is over

      30 June 2022

      The great crypto crash: the fallout, and what happens next

      22 June 2022

      Goodbye, Internet Explorer – you really won’t be missed

      19 June 2022

      Oracle’s database dominance threatened by rise of cloud-first rivals

      13 June 2022

      Everything Apple announced at WWDC – in less than 500 words

      7 June 2022
    • Podcasts

      How your organisation can triage its information security risk

      22 June 2022

      Everything PC S01E06 – ‘Apple Silicon’

      15 June 2022

      The youth might just save us

      15 June 2022

      Everything PC S01E05 – ‘Nvidia: The Green Goblin’

      8 June 2022

      Everything PC S01E04 – ‘The story of Intel – part 2’

      1 June 2022
    • Opinion

      Has South Africa’s advertising industry lost its way?

      21 June 2022

      Rob Lith: What Icasa’s spectrum auction means for SA companies

      13 June 2022

      A proposed solution to crypto’s stablecoin problem

      19 May 2022

      From spectrum to roads, why fixing SA’s problems is an uphill battle

      19 April 2022

      How AI is being deployed in the fight against cybercriminals

      8 April 2022
    • Company Hubs
      • 1-grid
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»News»Drupal security hole leaves admins scrambling

    Drupal security hole leaves admins scrambling

    News By Duncan McLeod30 October 2014
    Facebook Twitter LinkedIn WhatsApp Telegram Email
    drupal-640
    The Drupal logo

    Website administrators were scrambling on Thursday to patch their servers after a security hole in the Drupal content management system led to automated attacks, compromising website worldwide — but for many it may already be too late.

    Drupal is an open-source content management framework used by more than 2% of websites globally, ranging from small personal blogs through to major websites like whitehouse.gov.

    A “public service announcement” on Drupal.org stated: “You should proceed under the assumption that every Drupal 7 website was compromised unless updated and patched before 15 October.”

    Drupal had issued a patch for the problem on 15 October, but many websites haven’t updated to the latest version of the software.

    “Simply updating to Drupal 7.32 will not remove backdoors,” Drupal warned.

    “If you have not updated or applied this patch, do so immediately, then continue reading this announcement; updating to version 7.32 or applying the patch fixes the vulnerability but does not fix an already compromised website,” it said.

    “If you find that your site is already patched but you didn’t do it, this can be a symptom that the site was compromised — some attacks have applied the patch as a way to guarantee they are the only attacker in control of the site.”

    Even more worryingly, the announcement said: “Attackers may have copied all data out of your site and could use it maliciously. There may be no trace of the attack.”

    Attackers may have created backdoors (access points) in the database, code, files directory and other locations. Attackers could compromise other services on the server or escalate their access, the warning continued.

    “Removing a compromised website’s backdoors is difficult because it is not possible to be certain all backdoors have been found.

    “The Drupal security team recommends that you consult with your hosting provider. If they did not patch Drupal for you or otherwise block the ‘SQL injection’ attacks within hours of the announcement of 15 October at 4pm UTC [6pm South African time], restore your website to a backup from before 15 October 2014.

    “Take the website offline by replacing it with a static HTML page. Notify the server’s administrator, emphasising that other sites or applications hosted on the same server might have been compromised via a backdoor installed by the initial attack.

    “Consider obtaining a new server, or otherwise remove all the website’s files and database from the server. Restore the website (Drupal files, uploaded files and database) from backups from before 15 October 2014. Update or patch the restored Drupal core code. Put the restored and patched/updated website back online. Manually redo any desired changes made to the website since the date of the restored backup. Audit anything merged from the compromised website, such as custom code, configuration, files or other artefacts, to confirm they are correct and have not been tampered with.”

    Recovery without restoring from backup may be possible, but is not advised because backdoors can be extremely difficult to find, the announcement warned. “The recommendation is to restore from backup or rebuild from scratch.”  — © 2014 NewsCentral Media

    • Read the full statement on Drupal.org
    Drupal
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleScreening finds no Tshabalala degree
    Next Article Vodacom leaking users’ numbers: report

    Related Posts

    Google’s Equiano cable lands in Namibia

    3 July 2022

    More stage-6 load shedding on the cards for this week

    3 July 2022

    Load shedding nears previous annual record – with six months to go

    3 July 2022
    Add A Comment

    Comments are closed.

    Promoted

    Billetterie simplifies interactions between law firms and clients

    30 June 2022

    Think herding cats is tricky? Try herding a cloud

    29 June 2022

    How your business can help hybrid workers effectively

    28 June 2022
    Opinion

    Has South Africa’s advertising industry lost its way?

    21 June 2022

    Rob Lith: What Icasa’s spectrum auction means for SA companies

    13 June 2022

    A proposed solution to crypto’s stablecoin problem

    19 May 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.