drupalgeddon | Check sites for known Drupalgeddon stuff

 by   xurizaemon PHP Version: Current License: No License

kandi X-RAY | drupalgeddon Summary

kandi X-RAY | drupalgeddon Summary

drupalgeddon is a PHP library. drupalgeddon has no bugs, it has no vulnerabilities and it has low support. You can download it from GitHub.

I want a quick way of checking for known attack signatures on multiple sites across a set of servers. Making a Drush command is a quick way to enable this. A signature-based malware detector in PHP is probably a bad thing :) but this might be a useful tool for this situation, so here it is. Oh, feel free to fork / add / extend checks in the checks directory - one check per file, match the filename and function name. You’ll see. (This probably grew out of some idle thinking about adding our own custom checks to Archimedes / Aegir setup.).
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              drupalgeddon has a low active ecosystem.
              It has 5 star(s) with 2 fork(s). There are 1 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              There are 0 open issues and 1 have been closed. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of drupalgeddon is current.

            kandi-Quality Quality

              drupalgeddon has no bugs reported.

            kandi-Security Security

              drupalgeddon has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.

            kandi-License License

              drupalgeddon does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              drupalgeddon releases are not available. You will need to build from source code and install.
              Installation instructions, examples and code snippets are available.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of drupalgeddon
            Get all kandi verified functions for this library.

            drupalgeddon Key Features

            No Key Features are available at this moment for drupalgeddon.

            drupalgeddon Examples and Code Snippets

            No Code Snippets are available at this moment for drupalgeddon.

            Community Discussions

            QUESTION

            Ubuntu random command eats up 100% cup usage
            Asked 2018-May-21 at 19:57

            I have set up a ubuntu server in cloud. Recently I received an alert telling me that the CPU usage of my server is always 100%. I tried to investigate the incident but I have no clue what's going on. I am hoping some one can point me to the right direction based on what i have found.

            Here is what I can find:

            • Random command: I run "htop" to inspect which process is consuming my cpu resource. I found that a random command (named "tbq", as you can see in the pic) by "root" continues consuming my cpu resource. I tried to kill it with "kill -9 pid", but it revives instantly with a different random command. I can only stop the process with "kill -STOP pid".

            • elf file: I then inspect the syslog of my server, i found that the following command keeps running by "cron":

              CMD (cd /usr/share/nginx/html/drupal-dev/sites/default/files;./share)

            I navigate to the directory, there are few strange files with random name but with same content. I open the file with "nano", the followings are the first few lines of the file:

            ...

            ANSWER

            Answered 2018-May-21 at 18:28

            Using administrator account navigate to "Management Menu > Reports > Available Updates" or you could just go to www.yourwebsitename.com/admin/reports/updates using the address bar of your browser.

            • If you are using Drupal 7 your Drupal core version needs to be at least 7.58
            • If you are using Drupal 8 your Drupal core version needs to be at least 8.5.1

            If you are using below these versions, you can be sure that your server was exploited using the Drupalgeddon2 exploit.

            When I was in the same situation as you I just downloaded the database and the Drupal source code form the server, updated the Drupal core and uploaded the source code and database to another server.

            This fixed my problem

            Source https://stackoverflow.com/questions/50442799

            QUESTION

            Drupal 6 sql injection
            Asked 2018-May-03 at 12:56

            Is Drupal 6.x is vulnerable to SQL injection Attack AKA Drupalgeddon?

            If yes, what are vulnerable forms, directory or anything?

            ...

            ANSWER

            Answered 2018-May-03 at 12:56

            It was. It received a patch (long-term support).

            The vulnerability has been patched with the release of Drupal 7.58, 8.5.1, 8.3.9 and 8.4.6. While Drupal 6 has reached end of life and it’s not supported since February 2016, a fix has still been developed due to the severity of the flaw and the high risk of exploitation. https://www.securityweek.com/drupalgeddon-critical-flaw-exposes-million-drupal-websites-attacks

            Here is the patch for version 6: https://cgit.drupalcode.org/d6lts/tree/common/core/SA-CORE-2018-002.patch or the full release: https://github.com/d6lts/drupal/releases/tag/6.44 that contains commits for SA-CORE-2018-001,002,004

            Source https://stackoverflow.com/questions/50151146

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install drupalgeddon

            Change directory to either your unified or personal Drush folder in the commands subdirectory, like. ```` drush dl drupalgeddon ````.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/xurizaemon/drupalgeddon.git

          • CLI

            gh repo clone xurizaemon/drupalgeddon

          • sshUrl

            git@github.com:xurizaemon/drupalgeddon.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link