Menu
Three popular Drupal modules get patches for site takeover flaws

Three popular Drupal modules get patches for site takeover flaws

The vulnerabilities could allow attackers to execute rogue PHP code on web servers

The security team of the popular Drupal content management system worked with the maintainers of three third-party modules to fix critical vulnerabilities that could allow attackers to take over websites.

The flaws allow attackers to execute rogue PHP code web servers that host Drupal websites with the RESTWS, Coder or Webform Multiple File Upload modules installed. These modules are not part of Drupal's core, but are used by thousands of websites.

The RESTWS module is a popular tool for creating Rest application programming interfaces (APIs) and is currently installed on over 5,800 websites. Unauthenticated attackers can exploit the remote code execution vulnerability in its page callback functionality by sending specially crafted requests to the website.

There is no mitigating factor and upgrading to the module's latest version, which fixes the flaw, is highly recommended.

Coder is another popular module and allows Drupal administrators to check their code against various coding standards and best practices. It is installed on over 4,950 websites and it too contains a remote code execution vulnerability that can be exploited by unauthenticated attackers.

The module does not even need to be enabled in order for the flaw to be exploitable, its mere presence on the file system being enough.

Finally, the Webform Multiple File Upload module allows website administrators to receive multiple files from users and is installed on some 3,000 websites. It too has a vulnerability that could lead to remote code execution, but the flaw's exploitation depends on which libraries are available on  the website.

Furthermore, an attacker needs to be able to submit a web form with specifically crafted input and, depending on the site configuration, this might require authentication. Since there are mitigating factors that could limit the flaw's impact, it was rated only as critical instead of highly critical.

The Drupal CMS powers over one million websites, including 1 in 10 of the most popular 10,000 websites on the Internet that are based on a known content management system. It is commonly used by businesses.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Show Comments