Hi Cary, Thank you for responding! I've had some direct contacts, so hopefully will get it resolved.
thanks for everyone's willingness to help! best, Heidi Heidi Frank Electronic Resources & Special Formats Cataloger New York University Libraries Knowledge Access & Resources Management Services 20 Cooper Square, 3rd Floor New York, NY 10003 212-998-2499 (office) 212-995-4366 (fax) h...@nyu.edu Skype: hfrank71 On Wed, Nov 12, 2014 at 12:26 AM, Cary Gordon <listu...@chillco.com> wrote: > If the site was not patched within a few hours of the announcement, the > odds are that you will need to rebuild it from a backup made before October > 15th. It is very difficult to detect a successful exploit, or predict if a > back-door will be used. > > I suggest that your first move should be to contact Bluehost, as they may > have done the patch for you. If not, please read the rest of this thread. > If you have more questions or need help, let us know here. I will attempt > to address any issue that is explored in this forum. > > Cary > > > > On Nov 11, 2014, at 8:40 PM, Heidi P Frank <h...@nyu.edu> wrote: > > > > Hi, > > A colleague and I volunteer for an organization to maintain their > website, > > which is a Drupal site hosted on Bluehost, however, neither of us are > very > > experienced with Drupal. So we've been trying to figure out what we need > > to do to prevent the site from being affected by this vulnerability > issue, > > and have read a lot of the documentation and tried following the > > instructions to upgrade, etc. but are still having trouble. > > > > If there is anyone on this list who would be willing to speak with us and > > answer some questions about how we need to proceed, please contact me off > > list. Any guidance will be much appreciated with numerous Thank You's! > > (i.e., we need some pro bono assistance :) > > > > cheers, > > Heidi > > > > Heidi Frank > > Electronic Resources & Special Formats Cataloger > > New York University Libraries > > Knowledge Access & Resources Management Services > > 20 Cooper Square, 3rd Floor > > New York, NY 10003 > > 212-998-2499 (office) > > 212-995-4366 (fax) > > h...@nyu.edu > > Skype: hfrank71 > > > > On Sun, Nov 2, 2014 at 1:29 PM, Cary Gordon <listu...@chillco.com> > wrote: > > > >> If you can migrate to a maintained service, you could use feeds or > migrate > >> to move your content. You could also take that approach on your own > >> new site. Obviously, none of your entities — nodes, menus, users, > blocks, > >> taxonomies, etc. — should contain executable code. > >> > >> I suggest that you do not migrate users or menus, unless you have the > >> ability to validate your data. > >> > >> I love the internets, but I have learned that nobody should be > >> running public facing services — open-source or other — unless they are > >> prepared to maintain them, including managing a disaster recovery plan > and > >> vigilantly monitoring and acting on security notices. If this is not > >> doable, use a service provider to manage it. The days of running > services > >> from a computer under a desk are gone. > >> > >> Cary > >> > >> On Sunday, November 2, 2014, Hickner, Andrew <andrew.hick...@yale.edu> > >> wrote: > >> > >>> I'd be curious to hear how others are proceeding. We had already > planned > >>> to migrate our D7 sites to a centralized Drupal instance offered here > at > >>> Yale and this has just accelerated the timetable. I imagine there are > a > >>> lot of libraries running Drupal though who don't have this kind of > option > >>> and might not have pre-October 15 backups to revert to (we don't!) > >>> > >>> > >>> > >>> Andy Hickner > >>> Web Services Librarian > >>> Yale University > >>> Cushing/Whitney Medical Library > >>> http://library.medicine.yale.edu/ > >>> > >>> ________________________________________ > >>> From: Code for Libraries [CODE4LIB@LISTSERV.ND.EDU <javascript:;>] on > >>> behalf of Lin, Kun [l...@cua.edu <javascript:;>] > >>> Sent: Friday, October 31, 2014 2:10 PM > >>> To: CODE4LIB@LISTSERV.ND.EDU <javascript:;> > >>> Subject: Re: [CODE4LIB] Terrible Drupal vulnerability > >>> > >>> I think so. However, Cloudflare in their blog post claim they have > >> develop > >>> a way to block the attack immediately when the vulnerability was > >> announced. > >>> Whether or not they know the exploit ahead of time or not, it would be > >> good > >>> to know someone is watching out for you for $20 a month. And you will > be > >>> mad if you took Oct 15th off without it. I just check, I patched my > >>> instance on Oct 16th. Not sure what's going to happened. > >>> > >>> Kun > >>> > >>> -----Original Message----- > >>> From: Code for Libraries [mailto:CODE4LIB@LISTSERV.ND.EDU > >> <javascript:;>] > >>> On Behalf Of Cary Gordon > >>> Sent: Friday, October 31, 2014 1:44 PM > >>> To: CODE4LIB@LISTSERV.ND.EDU <javascript:;> > >>> Subject: Re: [CODE4LIB] Terrible Drupal vulnerability > >>> > >>> The vulnerability was discovered in the course of an audit by > >> SektionEins, > >>> a German security firm, and immediately reported to the Drupal Security > >>> Team. Because this was a pretty obscure vulnerability with no reported > >>> exploits, the team decided to wait until the first scheduled release > date > >>> after DrupalCon Amsterdam to put out the notice and patch. Obviously, > >> they > >>> knew that once word of the vulnerability was announced, there would > >>> immediately be a wave of exploits, so they imposed a blackout on any > >>> mention of it before October 15th. I think that they stuck to their > word. > >>> > >>> Of course, attacks started a few hours after the announcement. > >>> > >>> Cary > >>> > >>>> On Oct 31, 2014, at 9:38 AM, Joe Hourcle < > >> onei...@grace.nascom.nasa.gov > >>> <javascript:;>> wrote: > >>>> > >>>> On Oct 31, 2014, at 11:46 AM, Lin, Kun wrote: > >>>> > >>>>> Hi Cary, > >>>>> > >>>>> I don't know from whom. But for the heartbeat vulnerability earlier > >>> this year, they as well as some other big providers like Google and > >> Amazon > >>> were notified and patched before it was announced. > >>>> > >>>> If they have an employee who contributes to the project, it's possible > >>>> that this was discussed on development lists before it was sent down > >>>> to user level mailing lists. > >>>> > >>>> Odds are, there's also some network of people who are willing to give > >>>> things a cursory review / beta test in a more controlled manner before > >>>> they're officially released (and might break thousands of websites). > >>>> It would make sense that companies who derive a good deal of their > >>>> profits in supporting software would participate in those programs, as > >>> well. > >>>> > >>>> I could see categorizing either of those as 'ahead of the *general* > >>>> public', which was Kun's assertion. > >>>> > >>>> -Joe > >>>> > >>>> > >>>> > >>>>> -----Original Message----- > >>>>> From: Code for Libraries [mailto:CODE4LIB@LISTSERV.ND.EDU > >>> <javascript:;>] On Behalf > >>>>> Of Cary Gordon > >>>>> Sent: Friday, October 31, 2014 11:10 AM > >>>>> To: CODE4LIB@LISTSERV.ND.EDU <javascript:;> > >>>>> Subject: Re: [CODE4LIB] Terrible Drupal vulnerability > >>>>> > >>>>> How do they receive vulnerability report ahead of general public? > From > >>> whom? > >>>>> > >>>>> Cary > >>>>> > >>>>> On Friday, October 31, 2014, Lin, Kun <l...@cua.edu <javascript:;>> > >>> wrote: > >>>>> > >>>>>> If you are using drupal as main website, consider using Cloudflare > >> Pro. > >>>>>> It's just $20 a month and worth it. They'll help block most attacks. > >>>>>> And they usually receive vulnerability report ahead of general > >> public. > >>>>>> > >>>>>> Kun > >>>>>> > >>>>>> -----Original Message----- > >>>>>> From: Code for Libraries [mailto:CODE4LIB@LISTSERV.ND.EDU > >>> <javascript:;> > >>>>>> <javascript:;>] On Behalf Of Cary Gordon > >>>>>> Sent: Friday, October 31, 2014 9:59 AM > >>>>>> To: CODE4LIB@LISTSERV.ND.EDU <javascript:;> <javascript:;> > >>>>>> Subject: Re: [CODE4LIB] Terrible Drupal vulnerability > >>>>>> > >>>>>> This is what I posted to the Drupal4Lib list: > >>>>>> > >>>>>> -------------------- > >>>>>> > >>>>>> By now, you should have seen https://www.drupal.org/PSA-2014-003 > and > >>>>>> heard about the "Drupageddon" exploits. and you may be wondering if > >>>>>> you were vulnerable or iff you were hit by this, how you can tell > >>>>>> and what you should do. Drupageddon affects Drupal 7, Drupal 8 and, > >>>>>> if you use the DBTNG module, Drupal 6. > >>>>>> > >>>>>> The general recommendation is that if you do not know or are unsure > >>>>>> of your server's security and you did not either update to Drupal > >>>>>> 7.32 or apply the patch within a few hours of the notice, you should > >>>>>> assume that your site (and server) was hacked and you should restore > >>>>>> everything to a backup from before October 15th or earlier. If your > >>>>>> manage your server and you have any doubts about your file security, > >>>>>> you should restore that to a pre 10/15 image, as well or do a > >>> reinstall of your server software. > >>>>>> > >>>>>> I know this sounds drastic, and I know that not everyone will do > >> that. > >>>>>> There are some tests you can run on your server, but they can only > >>>>>> verify the hacks that have been identified. > >>>>>> > >>>>>> At MPOW, we enforce file security on our production servers. Our > >>>>>> deployments are scripted in our continuous integration system, and > >>>>>> only that system can write files outside of the temporal file > >>> directory (e.g. > >>>>>> /sites/site-name/files). We also forbid executables in the temporal > >>>>>> file system. This prevents many exploits related to this issue. > >>>>>> > >>>>>> Of course, the attack itself is on the database, so even if the file > >>>>>> system is not compromised, the attacker could, for example, get > >>>>>> admin access to the site by creating an account, making it an admin, > >>>>>> and sending themselves a password. While they need a valid email > >>>>>> address to set the password, they would likely change that as soon > as > >>> they were in. > >>>>>> > >>>>>> Some resources: > >>>>>> https://www.drupal.org/PSA-2014-003 > >>>>>> > >>>>>> > https://www.acquia.com/blog/learning-hackers-week-after-drupal-sql-i > >>>>>> nj > >>>>>> ection-announcement > >>>>>> > >>>>>> > http://drupal.stackexchange.com/questions/133996/drupal-sa-core-2014 > >>>>>> -0 05-how-to-tell-if-my-server-sites-were-compromised > >>>>>> > >>>>>> I won't attempt to outline every audit technique here, but if you > >>>>>> have any questions, please ask them. > >>>>>> > >>>>>> The takeaway from this incident, is that while Drupal has a great > >>>>>> security team and community, it is incumbent upon site owners and > >>>>>> admins to pay attention. Most Drupal security issues are only > >>>>>> exploitable by privileged users, and admins need to be careful and > >>>>>> read every security notice. If a vulnerability is publicly > >>> exploitable, you must take action immediately. > >>>>>> > >>>>>> Thanks, > >>>>>> > >>>>>> Cary > >>>>>> > >>>>>> On Thu, Oct 30, 2014 at 5:24 PM, Dan Scott <deni...@gmail.com > >>> <javascript:;> > >>>>>> <javascript:;>> wrote: > >>>>>> > >>>>>>> Via lwn.net, I came across https://www.drupal.org/PSA-2014-003 and > >>>>>>> my heart > >>>>>>> sank: > >>>>>>> > >>>>>>> """ > >>>>>>> Automated attacks began compromising Drupal 7 websites that were > >>>>>>> not patched or updated to Drupal 7.32 within hours of the > >>>>>>> announcement of > >>>>>>> SA-CORE-2014-005 > >>>>>>> - <https://www.drupal.org/SA-CORE-2014-005>Drupal > >>>>>>> <https://www.drupal.org/SA-CORE-2014-005> core - SQL injection > >>>>>>> <https://www.drupal.org/SA-CORE-2014-005>. You should proceed > under > >>>>>>> the assumption that every Drupal 7 website was compromised unless > >>>>>>> updated or patched before Oct 15th, 11pm UTC, that is 7 hours after > >>>>>>> the > >>>>>> announcement. > >>>>>>> """ > >>>>>>> > >>>>>>> That's about as bad as it gets, folks. > >>>>>>> > >>>>>> > >>>>>> > >>>>>> > >>>>>> -- > >>>>>> Cary Gordon > >>>>>> The Cherry Hill Company > >>>>>> http://chillco.com > >>>>>> > >>>>> > >>>>> > >>>>> -- > >>>>> Cary Gordon > >>>>> The Cherry Hill Company > >>>>> http://chillco.com > >>> > >> > >> > >> -- > >> Cary Gordon > >> The Cherry Hill Company > >> http://chillco.com > >> >