Lucian Constantin
CSO Senior Writer

Drupal to secure its update process with HTTPS

news
Jan 11, 20162 mins

Drupal to add HTTPS support and fix other issues with the content management system's update mechanism after a researcher recently found weaknesses

Developers of the popular Drupal content management system are working to secure the software’s update mechanism after a researcher recently found weaknesses in it.

Last week, researcher Fernando Arnaboldi from security firm IOActive disclosed several issues with the update mechanism in Drupal: the failure of the back-end administration panel to report update errors, a cross-site request forgery (CSRF) flaw that could allow attackers to force admins to repeatedly trigger update checks, and the lack of encryption for update downloads.

The last issue was the most significant one, because it could have allowed attackers who could intercept the traffic between a Drupal-based site and the official Drupal servers, to inject back-doored updates. Such an attack could lead to the compromise of the site and its database.

Fortunately, the Drupal security team was notified in advance and is working to fix the update shortcomings. Over the past few days the team has switched the project’s infrastructure to support HTTPS so that the update processes for the Drupal core and its modules use secure channels.

For now the team has enabled HTTPS updates in Drush, a popular command-line shell and scripting interface for Drupal. It has also switched all download links from the project’s pages to HTTPS.

The core update status module still doesn’t use secure transport, but this is being worked on and will be deployed in the next Drupal update, the security team said in a blog post.

For now, website administrators can use a supported version of Drush to deploy updates or can manually download the release archives from their corresponding project pages.

The failed update notification issue and the CSRF flaw have not been addressed yet, but the Drupal security team opened tracking tickets for them and asked developers to contribute patches.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author