View online: https://www.drupal.org/sa-contrib-2018-022
Project: DRD Agent [1]
Date: 2018-April-25
Security risk: *Critical* 15∕25
AC:None/A:None/CI:None/II:Some/E:Theoretical/TD:All [2]
Vulnerability: PHP object injection
Description:
This module enables you to monitor and manage any number of remote Drupal
sites and aggregate useful information for administrators in a central
dashboard.
The modules (DRD and DRD Agent) encrypt the data which is exchanged between
them but in order to do so, they use the PHP serialize/unserialize functions
instead of the json_encode/json_decode combination. As the unserialize
function is called on unauthenticated content, this introduces a PHP object
injection vulnerability.
Solution:
Install the latest version:
* If you use the DRD module for Drupal 8.x, upgrade to DRD 8.x-3.14 [3]
* If you use the DRD Agent module for Drupal 8.x, upgrade to DRD Agent
8.x-3.7 [4]
* If you use the DRD Agent module for Drupal 7.x, upgrade to DRD Agent
7.x-3.5 [5]
Reported By:
* David Snopek [6] of the Drupal Security Team
Fixed By:
* David Snopek [7] of the Drupal Security Team
* Jürgen Haas [8]
Coordinated By:
* David Snopek [9] of the Drupal Security Team
[1] https://www.drupal.org/project/drd_agent
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/node/2965986
[4] https://www.drupal.org/node/2965984
[5] https://www.drupal.org/node/2965982
[6] https://www.drupal.org/user/266527
[7] https://www.drupal.org/user/266527
[8] https://www.drupal.org/user/168924
[9] https://www.drupal.org/user/266527
View online: https://www.drupal.org/psa-2018-003
There will be a security release of * Drupal 7.x, 8.4.x, and 8.5.x on April
25th, 2018 between 16:00 - 18:00 UTC*. This PSA is to notify that the Drupal
core release is outside of the regular schedule [1] of security releases. For
all security updates, the Drupal Security Team urges you to reserve time for
core updates at that time because there is some risk that exploits might be
developed within hours or days. Security release announcements will appear on
the Drupal.org security advisory page.
This security release is a follow-up to the one released as SA-CORE-2018-002
[2] on March 28.
* Sites on 7.x or 8.5.x can immediately update when the advisory is
released
using the normal procedure.
* Sites on 8.4.x should immediately update to the 8.4.8 release that will
be
provided in the advisory, and then plan to update to 8.5.3 or the latest
security release as soon as possible (since 8.4.x no longer receives
official security coverage).
The security advisory will list the appropriate version numbers for each
branch. Your site's update report page will recommend the 8.5.x release even
if you are on 8.4.x or an older release, but temporarily updating to the
provided backport for your site's current version will ensure you can update
quickly without the possible side effects of a minor version update.
Patches for Drupal 7.x, 8.4.x, 8.5.x and 8.6.x will be provided in addition
to the releases mentioned above. (If your site is on a Drupal 8 release older
than 8.4.x, it no longer receives security coverage and will not receive a
security update. The provided patches may work for your site, but upgrading
is strongly recommended as older Drupal versions contain other disclosed
security vulnerabilities.)
This release will not require a database update.
The CVE for this issue is CVE-2018-7602. The Drupal-specific identifier for
the issue will be SA-CORE-2018-004.
The Security Team or any other party is not able to release any more
information about this vulnerability until the announcement is made. The
announcement will be made public at https://www.drupal.org/security, over
Twitter, and in email for those who have subscribed to our email list. To
subscribe to the email list: login on Drupal.org, go to your user profile
page, and subscribe to the security newsletter on the Edit » My newsletters
tab.
Journalists interested in covering the story are encouraged to email
security-press(a)drupal.org to be sure they will get a copy of the
journalist-focused release. The Security Team will release a
journalist-focused summary email at the same time as the new code release and
advisory.
If you find a security issue, please report it at
https://www.drupal.org/security-team/report-issue.
[1] https://www.drupal.org/node/1173280
[2] https://www.drupal.org/sa-core-2018-002
View online: https://www.drupal.org/psa-2018-002
* Advisory ID: PSA-2018-002
* Project: Drupal core [1]
* Version: 7.x, 8.x
* Date: 2018-April-13
* Security risk: 25/25 (Highly Critical)
AC:None/A:None/CI:All/II:All/E:Exploit/TD:All [2]
-------- DESCRIPTION
---------------------------------------------------------
This Public Service Announcement is a follow-up to SA-CORE-2018-002 - Drupal
core - RCE [3]. This is *not* an announcement of a new vulnerability. If you
have not updated your site as described in SA-CORE-2018-002 you should assume
your site has been targeted and follow directions for remediation as
described below.
The security team is now aware of automated attacks attempting to compromise
Drupal 7 and 8 websites using the vulnerability reported in SA-CORE-2018-002
[4]. Due to this, the security team is increasing the security risk score of
that issue to 25/25
*Sites not patched by Wednesday, 2018-04-11 may be compromised.* This is the
date when evidence emerged of automated attack attempts. It is possible
targeted attacks occurred before that.
*Simply updating Drupal will not remove backdoors or fix compromised sites.*
If you find that your site is already patched, but you didn’t do it, that
can be a symptom that the site was compromised. Some attacks in the past have
applied the patch as a way to guarantee that only that attacker is in control
of the site.
.... What to do if your site may be compromised
Attackers may have copied all data out of your site and could use it
maliciously. There may be no trace of the attack.
Take a look at our help documentation, ”Your Drupal site got hacked, now
what.” [5]
.... Recovery
Attackers may have created access points for themselves (sometimes called
“backdoors”) in the database, code, files directory and other locations.
Attackers could compromise other services on the server or escalate their
access.
Removing a compromised website’s backdoors is difficult because it is very
difficult to be certain all backdoors have been found.
If you did not patch, you should restore from a backup. While recovery
without restoring from backup may be possible, this is not advised because
backdoors can be extremely difficult to find. The recommendation is to
restore from backup or rebuild from scratch. For more information please
refer to this guide on hacked sites. [6]
-------- CONTACT AND MORE INFORMATION
----------------------------------------
We prepared a FAQ that was released when SA-CORE-2018-002 was published. Read
more at FAQ on SA-CORE-2018-002 [7].
The Drupal security team can be reached at security at drupal.org or via the
contact form at https://www.drupal.org/contact [8].
Learn more about the Drupal Security team and their policies [9], writing
secure code for Drupal [10], and securing your site [11].
[1] https://www.drupal.org/project/drupal
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/SA-CORE-2018-002
[4] https://www.drupal.org//www.drupal.org/sa-core-2018-002
[5] https://www.drupal.org/node/2365547
[6] https://www.drupal.org/node/2365547
[7] https://groups.drupal.org/security/faq-2018-002
[8] https://www.drupal.org/contact
[9] https://www.drupal.org/security-team
[10] https://www.drupal.org/writing-secure-code
[11] https://www.drupal.org/security/secure-configuration