NOTICE: Update Drupal to address critical vulnerabilities
Thursday, July 14, 2016
July 14, 2016: This information is intended for U-M IT staff who are responsible for university websites that use the Drupal content management system.
Summary
Drupal has has announced updates to multiple third-party modules that address highly critical vulnerabilities that could allow remote code execution. These vulnerable modules are third-party projects that are not part of Drupal core.
Threats
There are already reports of exploits in the wild. Exploitation could result in arbitrary PHP code execution by anonymous users. Vulnerable Drupal sites may be compromised quickly.
Affected Versions
According to the Drupal website, Drupal sites using the vulnerable third-party modules are affected, and security releases are available to address the vulnerabilities. IIA’s estimate is that only a small percentage of Drupal sites are likely to be affected. The affected module versions are:
- RESTful Web Services 7.x-2.x versions prior to 7.x-2.6
- RESTful Web Services 7.x-1.x versions prior to 7.x-1.7
- Coder module 7.x-1.x versions prior to 7.x-1.3
- Coder module 7.x-2.x versions prior to 7.x-2.6
- Webform Multifile 7.x-1.x versions prior to 7.x-1.4
Action Items
If the vulnerable third-party modules are in use, update them as soon as possible. Drupal core is not affected. If you do not use these modules, there is nothing you need to do.
Information for Users
Drupal is a content management system used to manage website content. Administrators of systems running Drupal need to apply the updates if the vulnerable third-party modules are in use. Users of those systems, and people who use Drupal to update web content, do not need to do anything.
In general, the best protection for your devices is this: keep your software and apps up-to-date, do not click suspicious links in email, do not open shared documents or email attachments unless you are expecting them and trust the person who sent them, and only use secure, trusted networks. For more information, see Spam, Phishing, and Suspicious Email, Instructions for Securing Your Devices and Data, and Use a Secure Internet Connection on the U-M Safe Computing website.
Questions, Concerns, Reports
Please contact [email protected].