November 4, 2014 By Shane Schick 2 min read

Most people probably like to go to work under the assumption that their website wasn’t hacked, but representatives of the Drupal content management system (CMS) say those who failed to immediately patch a critical vulnerability were likely compromised.

A prepared statement on Drupal.org details the nature of the vulnerability, which takes the form of a SQL injection flaw that allows automated attacks to hit sites that use the CMS. The vulnerability was discovered in mid-October, and though a patch was released, attackers likely targeted sites in less than eight hours, Threatpost reported.

Ironically, the CVE-2014-3704 vulnerability was specifically intended to thwart SQL injection attacks, in which malicious software code is used to gain access to a database. CSO Online said attackers were able to take advantage of unpatched Drupal sites to steal information and even take them over entirely. Like Heartbleed, which affected untold numbers of websites around the world, Drupal is largely looked over by a team of about 40 volunteers, CSO Online noted. This lack of resources may explain why the issue was initially disclosed in a public bug-tracking report from last year.

The potential impact of attacks on Drupal websites could be wide-ranging. The Web Host Industry Review noted an estimated 24 percent of .gov websites use the CMS, but it has been adopted far beyond the public sector as well. At this point, experts are suggesting that upgrading to Version 7.3 or applying the patch will not be enough and that users should assume their site has been infiltrated.

Instead, ZDNet and others shared an eight-point response plan that website administrators should pursue. The steps included taking sites offline and replacing them with a temporary HTML page, moving to a new server or removing files from the old server for analysis and restoring to backup versions of the site from before Oct. 14, 2014.

This last point is hugely important because, as PCWorld and others reported, attackers may have tried to cover their tracks by first compromising Drupal sites and then applying the patch themselves to prevent others from breaking in. In other words, even if a site looks like it’s already safe, it’s probably not.

If the site is hosted by a third party, administrators of other websites managed by the same service provider should also be notified. In fact, eWEEK interviewed sources that suggested it was service providers who played a key role in revealing the extent of the danger and recording details about some of the first attacks.

Image Source: Flickr

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today