Benji Fisher
March 14, 2025 - DrupalCamp NJ
Usability group, Migration subsystem, Security team
These slides borrow from some of Peter Wolanin’s “Cracking Drupal” presentations and from https://owasp.org/. According to the standard footer,
Unless otherwise specified, all content on the site is Creative Commons Attribution-ShareAlike v4.0 and provided without warranty of service or accuracy.
All of my slide decks have a similar license.
The Open Web Application Security Project® (OWASP) is a nonprofit foundation that works to improve the security of software.
source: https://owasp.org/
OWASP is not Drupal-specific. Let’s “get off the island”!
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
source: https://owasp.org/www-project-top-ten/
The list is updated every few years: 2017, 2021, 2025 (planned).
Drupal is a web-based content management system (CMS):
Enter data in my forms. I will save it to the database, then generate web pages.
Hacker:
Sounds great. Let’s get started!
Hacker:
Then
will become
source: https://xkcd.com/327/
The Drupal community is one of the largest open source communities in the world. We’re more than 1,000,000 passionate developers, designers, trainers, strategists, coordinators, editors, and sponsors working together.
source: https://www.drupal.org/about
The security team is an all-volunteer group of individuals who work to improve the security of the Drupal project. Members of the team come from countries across 4 continents … The team was formalized in 2005 with a mailing list and has had 4 team leads in that time period.
source: https://www.drupal.org/drupal-security-team/security-team-members
One site had custom access control for /user/1/edit
. The
access function left off a “not” and granted access to anyone
except User 1.
Q: How to protect yourself?
How do you avoid horror stories?
If customers knew the true cost of custom code, they would ask for less of it.
<img src="https://example.com/node/123/delete">
Questions:
.../edit
,
.../delete
, and more.The Drupal core Media module allows embedding internal and external media in content fields. In certain circumstances, the filter could allow an unprivileged user to inject HTML into a page when it is accessed by a trusted user with permission to embed media. In some cases, this could lead to cross-site scripting.
Solution: upgrade to Drupal 9.2.6, 9.1.13, or 8.9.19.
Commit b230624e5b:
Unless you are a cryptography maven, do not try to do it yourself. Know when to call for an expert!
Q: What data need protection?
PII includes Social Security numbers, credit cards, health information.
For example, drupal.org SSL Labs report
… not to be confused with Automatic Updates/Project Browser initiative
In Drupal\update\UpdateFetcher
:
/**
* URL to check for updates, if a given project doesn't define its own.
*/
const UPDATE_DEFAULT_URL = 'http://updates.drupal.org/release-history';
We did not fix that until Issue #1538118 2020-11-05. Drupal 7 was fixed 2023-06-06.
settings.php
value from external file.In core.services.yml
:
# The argument to the hashing service defined in services.yml,
# to the constructor of PhpassHashedPassword is the log2
# number of iterations for password stretching.
# @todo increase by 1 every Drupal version in order to
# counteract increases in the speed and power of computers
# available to crack the hashes. The current password hashing
# method was introduced in Drupal 7 with a log2 count of 15.
password:
class: Drupal\Core\Password\PhpassHashedPassword
arguments: [16]
In core.services.yml
:
source: A03:2021 - Injection
Drupal 7 includes a database abstraction API to ensure that queries executed against the database are sanitized to prevent SQL injection attacks.
A vulnerability in this API allows an attacker to send specially crafted requests resulting in arbitrary SQL execution. … this can lead to privilege escalation, arbitrary PHP execution, or other attacks.
This … can be exploited by anonymous users.
source: SA-CORE-2014-005
Because of the severity of the vulnerability and the simplicity of the update, we tested … and updated the site today.
source: my e-mail to boss and site owner (paraphrase)
(comment snipped from both)
// Update the query with the new placeholders.
// preg_replace is necessary to ensure the replacement does not affect
// placeholders that start with the same exact text. For example, if the
// query contains the placeholders :foo and :foobar, and :foo has an
// array of values, using str_replace would affect both placeholders,
// but using the following preg_replace would only affect :foo because
// it is followed by a non-word character.
$query = preg_replace(
'#' . $key . '\b#',
implode(', ', array_keys($new_keys)),
$query
);
(line breaks added)
Drupal core [adds] a .htaccess file into the files directories that stops execution of PHP scripts on the Apache web server. This protection is only necessary if there is a vulnerability on the site or on a server that allows users to upload malicious files. … This release includes new configuration to prevent PHP execution on several additional common Apache configurations.
source: SA-CORE-2013-003
File: sites/default/files/.htaccess
(as of Drupal
7.24)
# Existing lines:
Options None
Options +FollowSymLinks
SetHandler Drupal_Security_Do_Not_Remove_See_SA_2006_006
# New lines:
<Files *>
SetHandler Drupal_Security_Do_Not_Remove_See_SA_2013_003
</Files>
<IfModule mod_php5.c>
php_flag engine off
</IfModule>
File: sites/default/files/.htaccess
(as of Drupal
11.1.4)
# Was Options None; Options +FollowSymLinks
Options -Indexes -ExecCGI -Includes -MultiViews
SetHandler Drupal_Security_Do_Not_Remove_See_SA_2006_006
<Files *>
SetHandler Drupal_Security_Do_Not_Remove_See_SA_2013_003
</Files>
# Was mod_php5.c
<IfModule mod_php.c>
php_flag engine off
</IfModule>
▸ vendor/
▾ web/
▸ core/
▸ modules/
▸ profiles/
▾ sites/
▾ default/
▸ files/
▸ themes/
autoload.php
index.php
robots.txt
update.php
composer.json
composer.lock
Who has permission to write to each file/directory?
What happens with this markup?
Which users/roles have access to these text formats?
(Standard profile/recipe)
Some permissions are “restricted”.
Warning: Give to trusted roles only; this permission has security implications.
Do not show stack traces on production
The secret:
The most important thing is to do all the boring stuff you already know.
It is a lot like …
How to live a longer, healthier life!
It takes just 4 minutes a day!
Does that seem too good to be true?
#security-team
channel in Drupal
SlackUnofficial: @drupalsecurity on X, Mastodon
Two choices:
Either way, you are trusting the security team:
Q: Why was Drupal 9 EOL scheduled for Nov. 2023?
A: Drupal 9 used Symfony 4, which was EOL in Nov. 2023.
SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. It allows an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall, VPN, or another type of network access control list (ACL).
+--------+ +--------------+
| Web | | All your |
Browser -----> | Server | -----> | base are |
| (PHP) | | belong to us |
+--------+ +--------------+
+======================+
" +--------+ "
" | Web | --> SQL "
Browser -----> | Server | --> Solr "
" | (PHP) | --> Cache "
" +--------+ "
+======================+
The File Chooser Field allows users to upload files using 3rd party plugins such as Google Drive and Dropbox.
This module fails to validate user input sufficiently which could under certain circumstances lead to a Server Side Request Forgery (SSRF) vulnerability leading to Information Disclosure. In uncommon configurations and scenarios, it might lead to Remote Code Execution.
source: SA-CONTRIB-2023-015
// file: plugins/Dropbox.php.
public function download($destination, $url) {
return system_retrieve_file($url, $destination);
}
// file: file_chooser_field.field.inc.
[$phpClassName, $remote_file] = explode("::::", $file_url);
$local_file = file_chooser_field_plugin_method(...);
// ..
eval()
from the web interface@pwolanin
) for permission to borrow
parts of his presentation.@longwave
) for suggesting SA-CORE-2013-003
as an example of misconfiguration.
This slide deck by
Benji
Fisher is licensed under a
Creative
Commons Attribution-ShareAlike 4.0 International License.
Based on a work at
https://gitlab.com/benjifisher/slide-decks.