Secure Web 2.0 (& Drupal) Part 2

Tue, 05/26/2015 - 13:39 -- pottol
CMS Utilization

CMS Solutions

According to [1], the top three used product are: WordPress, Joomla! and Drupal. Everyone of these has proper pros and cons. The following graph depicts CMS usage during 2014, according to WebcomWebsites (http://www.webcomwebsites.co.uk/our-articles/ ):

 

https://d25m59h0ya0u4t.cloudfront.net/pub/uploadedImages/539715CMS.Sharing.png

In the following, WordPress, Joomla! and Drupal will be addressed, by security point of view.

 

CMS Security

CMS Security could be defined in a 5W-1H fashion, like in the following table. A fast comparison between WP,

Joomla! and Drupal was presented (see notes row):

 

5W1H

 

Description

Notes

5W1H

Issue

Description

Notes

Who

Secure Core Code

Code inspected by the Security Team, in order to assure the CMS Kernel is secure by itself.

 

What

Module Development

Security issues are statically checked by formal verification:

·  Core Security Check

·  Proactive Approach: 3rd party formal testing of posted modules

Drupal only

Where

Security Categories

The Security issues fall into one of the following categories:

1.  Core Code (CMS Kernel)

2.  3rd party Extension (Modules, Plug-ins, Themes)

3.  Custom per-Site (current implementation)

4.  Admin Configuration

5.  Environment (e.g. physical server, O.S., web server, DB, etc)

 

When

Access Control

Security issues are dynamically checked by revision of accessmechanisms:

·  Granular

·  Role System

Drupal only

Why

Security Issues

Security issues could involve one of the following:

·  Secure Code

·  Access Control

·  Content Security

 

How

Tackling Security

In order to avoid security issues, the following countermeasures and stadards are implemented:

·  Security Team

·  Object Interface

·  3rd party Integration

 

 

Easy Rules for CMS Protection

Here 5 simple rules for protecting the CMS:

1. Update and Patch CMS at a regular schedule

2. Backup CMS and underlying DB weekly

3. Subscribe to List and Forum about CMS vulnrablities

4. Change default usernames (e.g. “admin”) and use strong password

5. Double check additional components (plug-ins, modules) before installing them

 

Security Breaches

- Million WordPress websites vulnerable to DOM-based XSS

http://securityaffairs.co/wordpress/36607/hacking/million-wordpress-dom-based-xss.html

- WordPress: FBI Warns About ISIS-Themed Defacement

http://news.softpedia.com/news/FBI-Warns-About-ISIS-Themed-Defacement-Urges-WordPress-Admins-to-

Patch-477974.shtml

- CMS-Made-Simple (2007-09-13)

http://www.cmsmadesimple.org/cgblog/794/cmsmadesimple-org-defacement/

- SPIP: Santa Cecilia (2015-03-04)

Comments