Print

Print


I have a bluehost site with Wordpress on it.  In my case whenever a
vulnerability has been discovered they have been very good about
automatically updating it.  Keep in mind this is a standard instal using
cpanel.  Your mileage may vary if you did something custom.

Edward Iglesias

On Tue, Nov 11, 2014 at 11:40 PM, Heidi P Frank <[log in to unmask]> wrote:

> Hi,
> A colleague and I volunteer for an organization to maintain their website,
> which is a Drupal site hosted on Bluehost, however, neither of us are very
> experienced with Drupal.  So we've been trying to figure out what we need
> to do to prevent the site from being affected by this vulnerability issue,
> and have read a lot of the documentation and tried following the
> instructions to upgrade, etc. but are still having trouble.
>
> If there is anyone on this list who would be willing to speak with us and
> answer some questions about how we need to proceed, please contact me off
> list.  Any guidance will be much appreciated with numerous Thank You's!
>  (i.e., we need some pro bono assistance :)
>
> cheers,
> Heidi
>
> Heidi Frank
> Electronic Resources & Special Formats Cataloger
> New York University Libraries
> Knowledge Access & Resources Management Services
> 20 Cooper Square, 3rd Floor
> New York, NY  10003
> 212-998-2499 (office)
> 212-995-4366 (fax)
> [log in to unmask]
> Skype: hfrank71
>
> On Sun, Nov 2, 2014 at 1:29 PM, Cary Gordon <[log in to unmask]> wrote:
>
> > If you can migrate to a maintained service, you could use feeds or
> migrate
> > to move your content. You could also take that approach on your own
> > new site. Obviously, none of your entities — nodes, menus, users, blocks,
> > taxonomies, etc. — should contain executable code.
> >
> > I suggest that you do not migrate users or menus, unless you have the
> > ability to validate your data.
> >
> > I love the internets, but I have learned that nobody should be
> > running public facing services — open-source or other — unless they are
> > prepared to maintain them, including managing a disaster recovery plan
> and
> > vigilantly monitoring and acting on security notices. If this is not
> > doable, use a service provider to manage it. The days of running services
> > from a computer under a desk are gone.
> >
> > Cary
> >
> > On Sunday, November 2, 2014, Hickner, Andrew <[log in to unmask]>
> > wrote:
> >
> > > I'd be curious to hear how others are proceeding.  We had already
> planned
> > > to migrate our D7 sites to a centralized Drupal instance offered here
> at
> > > Yale and this has just accelerated the timetable.  I imagine there are
> a
> > > lot of libraries running Drupal though who don't have this kind of
> option
> > > and might not have pre-October 15 backups to revert to (we don't!)
> > >
> > >
> > >
> > > Andy Hickner
> > > Web Services Librarian
> > > Yale University
> > > Cushing/Whitney Medical Library
> > > http://library.medicine.yale.edu/
> > >
> > > ________________________________________
> > > From: Code for Libraries [[log in to unmask] <javascript:;>] on
> > > behalf of Lin, Kun [[log in to unmask] <javascript:;>]
> > > Sent: Friday, October 31, 2014 2:10 PM
> > > To: [log in to unmask] <javascript:;>
> > > Subject: Re: [CODE4LIB] Terrible Drupal vulnerability
> > >
> > > I think so. However, Cloudflare in their blog post claim they have
> > develop
> > > a way to block the attack immediately when the vulnerability was
> > announced.
> > > Whether or not they know the exploit ahead of time or not, it would be
> > good
> > > to know someone is watching out for you for $20 a month. And you will
> be
> > > mad if you took Oct 15th off without it. I just check, I patched my
> > > instance on Oct 16th. Not sure what's going to happened.
> > >
> > > Kun
> > >
> > > -----Original Message-----
> > > From: Code for Libraries [mailto:[log in to unmask]
> > <javascript:;>]
> > > On Behalf Of Cary Gordon
> > > Sent: Friday, October 31, 2014 1:44 PM
> > > To: [log in to unmask] <javascript:;>
> > > Subject: Re: [CODE4LIB] Terrible Drupal vulnerability
> > >
> > > The vulnerability was discovered in the course of an audit by
> > SektionEins,
> > > a German security firm, and immediately reported to the Drupal Security
> > > Team. Because this was a pretty obscure vulnerability with no reported
> > > exploits, the team decided to wait until the first scheduled release
> date
> > > after DrupalCon Amsterdam to put out the notice and patch. Obviously,
> > they
> > > knew that once word of the vulnerability was announced, there would
> > > immediately be a wave of exploits, so they imposed a blackout on any
> > > mention of it before October 15th. I think that they stuck to their
> word.
> > >
> > > Of course, attacks started a few hours after the announcement.
> > >
> > > Cary
> > >
> > > > On Oct 31, 2014, at 9:38 AM, Joe Hourcle <
> > [log in to unmask]
> > > <javascript:;>> wrote:
> > > >
> > > > On Oct 31, 2014, at 11:46 AM, Lin, Kun wrote:
> > > >
> > > >> Hi Cary,
> > > >>
> > > >> I don't know from whom. But for the heartbeat vulnerability earlier
> > > this year, they as well as some other big providers like Google and
> > Amazon
> > > were notified and patched before it was announced.
> > > >
> > > > If they have an employee who contributes to the project, it's
> possible
> > > > that this was discussed on development lists before it was sent down
> > > > to user level mailing lists.
> > > >
> > > > Odds are, there's also  some network of people who are willing to
> give
> > > > things a cursory review / beta test in a more controlled manner
> before
> > > > they're officially released (and might break thousands of websites).
> > > > It would make sense that companies who derive a good deal of their
> > > > profits in supporting software would participate in those programs,
> as
> > > well.
> > > >
> > > > I could see categorizing either of those as 'ahead of the *general*
> > > > public', which was Kun's assertion.
> > > >
> > > > -Joe
> > > >
> > > >
> > > >
> > > >> -----Original Message-----
> > > >> From: Code for Libraries [mailto:[log in to unmask]
> > > <javascript:;>] On Behalf
> > > >> Of Cary Gordon
> > > >> Sent: Friday, October 31, 2014 11:10 AM
> > > >> To: [log in to unmask] <javascript:;>
> > > >> Subject: Re: [CODE4LIB] Terrible Drupal vulnerability
> > > >>
> > > >> How do they receive vulnerability report ahead of general public?
> From
> > > whom?
> > > >>
> > > >> Cary
> > > >>
> > > >> On Friday, October 31, 2014, Lin, Kun <[log in to unmask] <javascript:;>>
> > > wrote:
> > > >>
> > > >>> If you are using drupal as main website, consider using Cloudflare
> > Pro.
> > > >>> It's just $20 a month and worth it. They'll help block most
> attacks.
> > > >>> And they usually receive vulnerability report ahead of general
> > public.
> > > >>>
> > > >>> Kun
> > > >>>
> > > >>> -----Original Message-----
> > > >>> From: Code for Libraries [mailto:[log in to unmask]
> > > <javascript:;>
> > > >>> <javascript:;>] On Behalf Of Cary Gordon
> > > >>> Sent: Friday, October 31, 2014 9:59 AM
> > > >>> To: [log in to unmask] <javascript:;> <javascript:;>
> > > >>> Subject: Re: [CODE4LIB] Terrible Drupal vulnerability
> > > >>>
> > > >>> This is what I posted to the Drupal4Lib list:
> > > >>>
> > > >>> --------------------
> > > >>>
> > > >>> By now, you should have seen https://www.drupal.org/PSA-2014-003
> and
> > > >>> heard about the "Drupageddon" exploits. and you may be wondering if
> > > >>> you were vulnerable or iff you were hit by this, how you can tell
> > > >>> and what you should do. Drupageddon affects Drupal 7, Drupal 8 and,
> > > >>> if you use the DBTNG module, Drupal 6.
> > > >>>
> > > >>> The general recommendation is that if you do not know or are unsure
> > > >>> of your server's security and you did not either update to Drupal
> > > >>> 7.32 or apply the patch within a few hours of the notice, you
> should
> > > >>> assume that your site (and server) was hacked and you should
> restore
> > > >>> everything to a backup from before October 15th or earlier. If your
> > > >>> manage your server and you have any doubts about your file
> security,
> > > >>> you should restore that to a pre 10/15 image, as well or do a
> > > reinstall of your server software.
> > > >>>
> > > >>> I know this sounds drastic, and I know that not everyone will do
> > that.
> > > >>> There are some tests you can run on your server, but they can only
> > > >>> verify the hacks that have been identified.
> > > >>>
> > > >>> At MPOW, we enforce file security on our production servers. Our
> > > >>> deployments are scripted in our continuous integration system, and
> > > >>> only that system can write files outside of the temporal file
> > > directory (e.g.
> > > >>> /sites/site-name/files). We also forbid executables in the temporal
> > > >>> file system. This prevents many exploits related to this issue.
> > > >>>
> > > >>> Of course, the attack itself is on the database, so even if the
> file
> > > >>> system is not compromised, the attacker could, for example, get
> > > >>> admin access to the site by creating an account, making it an
> admin,
> > > >>> and sending themselves a password. While they need a valid email
> > > >>> address to set the password, they would likely change that as soon
> as
> > > they were in.
> > > >>>
> > > >>> Some resources:
> > > >>> https://www.drupal.org/PSA-2014-003
> > > >>>
> > > >>>
> https://www.acquia.com/blog/learning-hackers-week-after-drupal-sql-i
> > > >>> nj
> > > >>> ection-announcement
> > > >>>
> > > >>>
> http://drupal.stackexchange.com/questions/133996/drupal-sa-core-2014
> > > >>> -0 05-how-to-tell-if-my-server-sites-were-compromised
> > > >>>
> > > >>> I won't attempt to outline every audit technique here, but if you
> > > >>> have any questions, please ask them.
> > > >>>
> > > >>> The takeaway from this incident, is that while Drupal has a great
> > > >>> security team and community, it is incumbent upon site owners and
> > > >>> admins to pay attention. Most Drupal security issues are only
> > > >>> exploitable by privileged users, and admins need to be careful and
> > > >>> read every security notice. If a vulnerability is publicly
> > > exploitable, you must take action immediately.
> > > >>>
> > > >>> Thanks,
> > > >>>
> > > >>> Cary
> > > >>>
> > > >>> On Thu, Oct 30, 2014 at 5:24 PM, Dan Scott <[log in to unmask]
> > > <javascript:;>
> > > >>> <javascript:;>> wrote:
> > > >>>
> > > >>>> Via lwn.net, I came across https://www.drupal.org/PSA-2014-003
> and
> > > >>>> my heart
> > > >>>> sank:
> > > >>>>
> > > >>>> """
> > > >>>> Automated attacks began compromising Drupal 7 websites that were
> > > >>>> not patched or updated to Drupal 7.32 within hours of the
> > > >>>> announcement of
> > > >>>> SA-CORE-2014-005
> > > >>>> - <https://www.drupal.org/SA-CORE-2014-005>Drupal
> > > >>>> <https://www.drupal.org/SA-CORE-2014-005> core - SQL injection
> > > >>>> <https://www.drupal.org/SA-CORE-2014-005>. You should proceed
> under
> > > >>>> the assumption that every Drupal 7 website was compromised unless
> > > >>>> updated or patched before Oct 15th, 11pm UTC, that is 7 hours
> after
> > > >>>> the
> > > >>> announcement.
> > > >>>> """
> > > >>>>
> > > >>>> That's about as bad as it gets, folks.
> > > >>>>
> > > >>>
> > > >>>
> > > >>>
> > > >>> --
> > > >>> Cary Gordon
> > > >>> The Cherry Hill Company
> > > >>> http://chillco.com
> > > >>>
> > > >>
> > > >>
> > > >> --
> > > >> Cary Gordon
> > > >> The Cherry Hill Company
> > > >> http://chillco.com
> > >
> >
> >
> > --
> > Cary Gordon
> > The Cherry Hill Company
> > http://chillco.com
> >
>