drupalgeddon | Check sites for known Drupalgeddon stuff
kandi X-RAY | drupalgeddon Summary
kandi X-RAY | drupalgeddon Summary
I want a quick way of checking for known attack signatures on multiple sites across a set of servers. Making a Drush command is a quick way to enable this. A signature-based malware detector in PHP is probably a bad thing :) but this might be a useful tool for this situation, so here it is. Oh, feel free to fork / add / extend checks in the checks directory - one check per file, match the filename and function name. You’ll see. (This probably grew out of some idle thinking about adding our own custom checks to Archimedes / Aegir setup.).
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of drupalgeddon
drupalgeddon Key Features
drupalgeddon Examples and Code Snippets
Community Discussions
Trending Discussions on drupalgeddon
QUESTION
I have set up a ubuntu server in cloud. Recently I received an alert telling me that the CPU usage of my server is always 100%. I tried to investigate the incident but I have no clue what's going on. I am hoping some one can point me to the right direction based on what i have found.
Here is what I can find:
Random command: I run "htop" to inspect which process is consuming my cpu resource. I found that a random command (named "tbq", as you can see in the pic) by "root" continues consuming my cpu resource. I tried to kill it with "kill -9 pid", but it revives instantly with a different random command. I can only stop the process with "kill -STOP pid".
elf file: I then inspect the syslog of my server, i found that the following command keeps running by "cron":
CMD (cd /usr/share/nginx/html/drupal-dev/sites/default/files;./share)
I navigate to the directory, there are few strange files with random name but with same content. I open the file with "nano", the followings are the first few lines of the file:
...ANSWER
Answered 2018-May-21 at 18:28Using administrator account navigate to "Management Menu > Reports > Available Updates" or you could just go to www.yourwebsitename.com/admin/reports/updates using the address bar of your browser.
- If you are using Drupal 7 your Drupal core version needs to be at least 7.58
- If you are using Drupal 8 your Drupal core version needs to be at least 8.5.1
If you are using below these versions, you can be sure that your server was exploited using the Drupalgeddon2 exploit.
When I was in the same situation as you I just downloaded the database and the Drupal source code form the server, updated the Drupal core and uploaded the source code and database to another server.
This fixed my problem
QUESTION
Is Drupal 6.x is vulnerable to SQL injection Attack AKA Drupalgeddon?
If yes, what are vulnerable forms, directory or anything?
...ANSWER
Answered 2018-May-03 at 12:56It was. It received a patch (long-term support).
The vulnerability has been patched with the release of Drupal 7.58, 8.5.1, 8.3.9 and 8.4.6. While Drupal 6 has reached end of life and it’s not supported since February 2016, a fix has still been developed due to the severity of the flaw and the high risk of exploitation. https://www.securityweek.com/drupalgeddon-critical-flaw-exposes-million-drupal-websites-attacks
Here is the patch for version 6: https://cgit.drupalcode.org/d6lts/tree/common/core/SA-CORE-2018-002.patch or the full release: https://github.com/d6lts/drupal/releases/tag/6.44 that contains commits for SA-CORE-2018-001,002,004
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install drupalgeddon
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page