Drupal admins - Apply security update ASAP / safecomputing.umich.edu

ALERT: Drupal admins - Apply security update ASAP

Wednesday, March 28, 2018

This information was sent to U-M IT staff groups via email on March 28, 2018. It is intended for U-M IT staff who are responsible for university websites that use the Drupal content management system.

Summary

Last week, we asked that you watch for a promised security update to Drupal with an expected release date of March 28. That security release is now available. Please apply it as soon as possible after appropriate testing.

Problem

A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised. The Drupal Security Team has released security updates and patches to address the vulnerability.

Also be aware that Drupal is reporting via the Drupal Twitter account that members of the Drupal community are being targeted with malicious email sign ups, phishing attacks, and so on coordinated with the release of the Drupal security advisory, releases, and patches.

Affected Versions

Drupal 6.x, 7.x, 8.0.x, 8.1.x,  8.3.x, 8.4.x, and 8.5.x.

Note that although Drupal 8.3.x and 8.4.x are no longer supported, the Drupal Security Team has provided security updates for them given the potential severity of the vulnerability. If you are running Drupal 8.3.x or 8.4.x, you should upgrade to a supported version.

Action Items

Apply the update as soon as possible after appropriate testing. See the Drupal Security Advisory for details and links to the latest releases and patches. See the Drupal FAQ about SA-CORE-2018-002 for additional information.

About updates for U-M services:

  • ITS Web Application Hosting. If you have a Drupal installation through ITS Web Hosting, you will need to update it.    
  • U-M Hosting Platform. Drupal on the U-M Hosting Platform will be updated for you. If you use this service, you do not need to take action.

Threats

A remote code execution vulnerability in Drupal could potentially allow attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised. Exploits could allow all site data to be modified or deleted. See Drupal FAQ about SA-CORE-2018-002 for details. The Drupal Security Team expects that exploits might be developed within hours or days now that information about the vulnerability and security release have been made public.

Information for Users

Drupal is a content management system used to manage website content. Administrators of systems running Drupal need to apply the update. Content managers and website users do not need to do anything.

In general, the best protection for your devices is this: keep your software and apps up-to-date, do not click suspicious links in email, do not open shared documents or email attachments unless you are expecting them and trust the person who sent them, and only use secure, trusted networks. For more information, see Phishing & Suspicious Email, Secure Your Devices, and Use a Secure Internet Connection on the U-M Safe Computing website.