Security

We encourage users to post events happening in the community to the community events group on https://www.drupal.org.

Discussion security best practices in general. This is NOT a place to discuss vulnerabilities in released versions of specific public modules nor Drupal core. Please only ask questions before releasing a module or phrase them generally. If you find a security vulnerability in publicly available code the proper thing to do is report it to the Security Team.

On twitter see @drupalsecurity.

greggles's picture

FAQ about CVE-2017-6919 / SA-CORE-2017-002

This is a group of questions and answers to help explain SA-CORE-2017-002 which has CVE CVE-2017-6919.

Q: Can you explain the risks associated with this vulnerability, and what an attack would look like?

Read more
Jose Reyero's picture

Marking projects as unsupported / What is a Supported Project / Better policy needed.

As we've just seen recently with References project SA followed by the module being marked as unsupported, though this is just an example of many, this may be a major issue for thousands of sites using a module. May be you cannot disable it right away, there may be available replacements or not, but in any case this way of doing things (Unspecified SA, then Unsupported) is putting thousands of sites at risk.

I believe there should be better ways to handle these cases and though I don't know how exactly, it will need some discussion, here are just some ideas about it:

Read more
benjy's picture

Discussion around which holidays to avoid for security advisories

Today's security advisories were released the day before everyone goes on a 4 day break here in Australia and therefore put a lot of pressure on agencies to have all the security issues patched in the last day of work.

We already have a list of holidays and events we try to avoid here - https://www.drupal.org/node/1762316 - I'm proposing we add the Easter break to that list but would welcome feedback from others on holidays that should or should not be included in the list.

Read more
DamienMcKenna's picture

Clearly document what things are not considered security issues

We have clear(-ish) instructions on how to report a security issue but we don't clearly define what we consider not to be a security problem. It would be useful if we had a clearly defined list of things that are not considered security issues to reduce the amount of issues being opened unnecessarily, thus reduce the amount of time needed to triage the security issue queue; also, this list should either be present on the "how to report" page or at least linked off it right at the top of the page.

Read more
DamienMcKenna's picture

Document policy on who gets credit on SAs

While it is mentioned in some locations, the security team's policy is not made completely clear on who gets credit on an SA or what format it will be in. It was briefly discussed before (https://groups.drupal.org/node/194073) and here's the SA form fields have default values like the following:

<

ul>

  • <a href="https://www.drupal.org/user/XXXUID">Real Name</a>
  • <a href="https://www.drupal.org/user/XXXUID">Real Name</a> of the Drupal Security Team
  • Read more
    DamienMcKenna's picture

    Define a policy on how to handle security issues opened on drupal.org for security-team-supported projects

    We need some clarification and standardizing around how to handle an issue logged on the public drupal.org site for a project which is covered by the security team. There currently isn't a standard process, though the following appear to be the defacto process:

    • The node is unpublished.
    • An sdo issue is created if needed.
    • The person is added to the sdo issue.

    This leaves a few open questions:

    <

    ul>

  • Webmasters looking at an unpublished node may not be aware of why it's unpublished and might mistake it for e.g. spam.
  • Read more
    DamienMcKenna's picture

    Define a policy on how long distributions should wait before releasing security updates

    One thing I've noticed is that there are no policies around how quickly distributions should be updated once one of their dependencies has a security update. It might be useful to have one. I'm sure there are some packaging / d.o UI improvements that might help with this too, e.g. https://www.drupal.org/node/2842816, or maybe an opt-in thing to automatically update distributions?

    Read more
    betz's picture

    Sleep is Gold: Proposal to shorten the security updates release window.

    Disclaimer

    As I don't find a issue queue for the security team (probably a good thing), I am posting this here.
    Thanks @DamienMcKenna for pointing me to this direction.

    Problem/Motivation

    Currently the security updates window is every wednesday between 12 noon and 5pm Eastern time.
    Depending on where you are in the world, this might be outside office hours.
    Belgium is such a case, where the release window is currently between 5pm and 11pm.
    Such a wide release window makes it very hard and expensive for individuals to be on call for possible releases.

    Read more
    xjm's picture

    Drupal 8.x core release on Monday, July 18 (update to previously scheduled window)

    The Drupal core security release window has been moved to Monday, July 18. See the PSA announcement for the release for details.

    Read more
    sinn's picture

    One another way to sanitize database - DB Sanitizer

    Problem/Motivation.
    Drupal stores data for each entity in few tables: base table, field tables, revision table, field revision tables. It becomes difficult to support script for cleaning database when we have a lot of entities in a project and structure of entities are changed periodically.

    Existing method of cleaning database from personal and critical data drush sql-sanitize command has few restrictions: need to implement hook_drush_sql_sync_sanitize in your modules and write all sql commands manually, need to keep in mind entities structure and it doesn't have UI.

    Read more
    greggles's picture

    Discussion for RCE in Contrib PSA and announcements

    Hi!

    Based on a lot of discussion, especially in this thread, the security team adjusted the way we announced the most recent contrib module releases.

    • We did a psa 24 hours in advance and named the time of the release
    • The PSA (after editing, whoops, should have been in the initial version) included the number of installed sites roughly
    • We have a security scale and could specifically say how critical the upcoming issues were
    • We used twitter to talk about it as well
    Read more
    greggles's picture

    New feature in paranoia module: sanitizing db tables based on a whitelist approach

    Hi,

    I'm excited to announce a new feature in the paranoia module: database sanitizing based on a whitelist.

    The main way to sanitize databases now is drush sql-sanitize which works on a blocklist approach. If you add a module or table to your site that stores data in the database that you want to clean up then you must actively add a hook_drush_sql_sync_sanitize that will declare the right command, but it doesn't say if it has cleaned up all the columns in the table.

    Read more
    Drupal Security Team's picture

    Drupal Security Team response about insecure update process

    Recently, a security researcher reported some vulnerabilities to the Drupal Security Team. The Security Team and researcher worked together to understand the risks and decided that the potential impact was small enough that the reported problems could be fixed in public and that the researcher would write a blog post with their perspective on the situation.

    Read more
    maq.said's picture

    Preventing Website Copy and videos from getting downloaded.

    Hi there,
    Apart from SSL, malware protection provided by web hosting company I need to be sure about Drupal providing the following features:

    1) Disable right click on my website.
    2) Image copy protection.
    3) Mirror Image of site should not be allowed by end user on his/her local PC.
    4) My videos have copy rights and I only want live streaming and end- user should not be allowed to download the videos directly or by downloading my entire site.

    Read more
    pflame's picture

    Access log shows node_page_default, node_page_view urls

    Hi,

    I noticed some strange things in apache access_log file. There are URL requests for /node_page_default, /node_page_view which does not exists and results page not found message.

    These requests are taking more time to respond. Sometimes it is 1.5sec. Wich causes unnecessary usage of resources, bandwidth and affecting throughput.

    Does it mean, someone is trying to hack? How can I avoid it?

    Read more
    greggles's picture

    Locking vendor accounts after their job is over, locking inactive admin accounts at 90 days

    Old and unused accounts with admin access are a common entry point for attacks. They often have weaker passwords than a current account and the passwords are not being rotated making the accounts easier to brute-force over a long period.

    There are two policies that create a solution to this problem:

    1. If a vendor will be doing work for a known amount of time, set their account to expire (be made inactive) on the date their work is likely to be done. This is required by PCI DSS 3.1 section 8.1.4.
    Read more
    mgifford's picture

    Drupal Security Guide

    Wanted announce our Drupal Security Guide here. We've just updated it with information about Drupal 8.

    This document has had contributions from lots of folks, but is still certainly a work in progress. That being said, there are over 65 pages worth of information about almost all aspects of Drupal security.

    https://openconcept.ca/drupal-security-best-practices-practical-guide

    Read more
    InternetDevels's picture

    How to ensure your Drupal website security

    The Drupal core is well protected by default, but you can ensure your website security by following some additional security rules that can protect your site from attacks and other threats.

    These rules are about using http, deleting/blocking a user, preventing the execution of unreliable php code, hiding information from users and more. If you are interested, you can find all the details in the blog post by our developer.

    http://internetdevels.com/blog/your-drupal-website-security-how-you-can-ensure-it

    Read more
    sf_wind's picture

    Anyone has seen this hack to drupal site?

    I have most recent drupal version, and when logged in as admin, every page load tries to load something from the domain teaserguide.com, but fails.

    I googled online but found very little discussion on this. The limited discussions I've found so far are related to wordpress. For example, this article describes the hack on wordpress:
    http://sntjohnny.com/front/the-teaserguide-wordpress-hack/2683.html

    This kind of hack seems to be spread only very recently. From this article, the hack sneaks into some heavily protected sites.

    Read more
    scor's picture

    Security sessions at DrupalCon Barcelona

    Just a quick note to those attending DrupalCon next week. Two representatives of the Drupal Security team will hold a session next week at DrupalCon Barcelona: Drupal and Security: what you need to know. It is scheduled for Wednesday at 2:15pm. Come and learn about best practices to keep your Drupal site safe from hackers.

    Read more
    Subscribe with RSS Syndicate content