## Security Teach Us

Hey there. This is my frist post in Deamwork. Thank you for your supporting.

Recently, a severe SQL Injection vulnerability was found in Drupal 7. It was fixed immediately (and correctly), but there was a problem. Attackers made automated scripts to attack unpatched sites. Within hours of the release of the vulnerability fix, sites were being compromised. And when I say compromised, I'm talking remote code execution, backdoors, the lot. Why? Like any attack, it's a chain of issues, that independently aren't as bad, but add up to bad news. Let's talk about them: What went wrong? What went right? And what could have happened better? There's a lesson that every developer needs to learn in here.

### The Original Vulnerability

Drupal 7.x comes with a database connection wrapper which basically provides helper functions to make creating prepared statements easier. In general, it's a pretty good abstraction (and if you've read my blog before, you know how hard I am on abstractions).

One of those "helpers" is a protected method called expandArguments(&$query, &$args). This takes an array of arguments, each of which could be an array, and expands those nested arrays into individual placeholders. Here's the code with comments stripped out (click the function name above for the original source):

To see what it would do, let's look at an example:

It's a really helpful tool for handling things like IN expansion (like the example above).

What's the problem? Can you spot it?

Well, what happens if you passed this argument array:

The query that would be generated would be:

Boom, injected.

### The Fix

The fix was a trivial change. Simply change foreach ($data as$i => $value) to foreach (array_values($data) as $i =>$value). A 14 character diff. And it just throws away the keys.

So simple.

And the Drupal security team did a fantastic job getting the patch out there, and messaging the communication.

Compounding Problems

There are a few compounding problems that made this vulnerability far worse than it could have been. What I am about to detail is not a knock on Drupal, not by any means. It's just analyzing the situation, one that could happen to any project.

Drupal Uses Emulated Prepared Statements

On old versions of MySQL (before 5.1), real prepared statements skipped query cache
Real prepared statements are marginally slower (due to a second network round trip for the data)
Normally, this is only a theoretical risk. In fact, prior to this attack, I was OK with them using emulated prepares. But there's one killer problem with emulated prepares that turned the primary vulnerability from "Huge" to downright MASSIVE.

MySQL prepared statements are limited to a single query. So

Would error. Because there is more than one query to prepare!

But PDO's emulated prepared statements split that query into two. Meaning that it becomes valid again.

Without this emulation, to successfully modify the database, an attacker would need to find an appropriate write query that they can inject into. This is often non-trivial and significantly limits the damage an attacker can do. But by using emulated prepares, it allows the attacker to do arbitrary writes into the database.

Check.

Note: It's worth noting that using emulated prepares in this case is not a vulnerability. It just opened a door that wouldn't have been there if they weren't turned on.

Input Was Not Always Filtered Appropriately

There are tons of places in Drupal's core where user input is not filtered prior to being passed to the database layer. Normally, this is not a vulnerability, but it does violate the FILTER IN-ESCAPE OUT principle.

For example, the user login module passes esentially raw input to the database layer. This normally wouldn't be a problem (since it's a read query, not a write query). But this does mean that an attacker simply needs to pass in a crafted array to exploit it:

Replace

With

And boom, injected.

This means that an attacker can hit almost any query, not just ones that use an IN clause expansion.

By itself, this is not a major issue. Normally (short of the main vulnerability) this would not result in a problem. But coupling them together does increase the attack surface significantly.

Check Mate.

Drupal Can Execute Code From The Database

Drupal 7 ships with a module called PHP which allows for inserting arbitrary PHP code into the database, which it will then evaluate. This sounds bad, but normally it requires site administrator privileges to turn on, and to use. So a user that can actually inject PHP code already has admin access to do the same. So it's normally not a major issue.

However, if you can inject into the database, you can turn on modules that used to be off. And you can inject arbitrary content, as if it was authored by anyone on the system.

So that means that an attacker can enable the PHP module, inject a back door, and then execute that back door to further compromise the site.

Game Over.

Note: It's worth noting that Drupal 8 removed this module for exactly this reason.

None of these three are normally vulnerabilities. Normally, they can co-exist quite fine. But combined with the SQLi vulnerability, it's basically a perfect storm.

How Did This Happen?

Everyone makes mistakes.

Everyone.

It's going to happen sooner or later. Heck, this vulnerable code was in the database layer since 2008, and was just discovered two weeks ago. That says something about how complex vulnerabilities can be.

The key is not "did it happen", but how is it dealt with.

Was it fixed quickly and correctly?

In this case, yes, yes it was.

Was it communicated appropriately?

In this case, yes, yes it was.

Were appropriate practices followed to prevent it?

Mostly. There are definitely areas they could do better (the three I included above could have been done differently).

However, none of this is cut-and-dry. Everything is a tradeoff. With emulated prepares, they chose speed and efficiency over a theoretical security bump. And at the time, this seemed like a reasonable decision. But in hindsight, it combined with another issue to make things worse. Does that mean that it was wrong to do back then? I don't think it's fair to say that. It could open the door today to ask that question of going forward what should happen. But it's definitely not a "OMG YOU GUYZ WERE NEGLIGENT".

### The Big Lesson

I consider the Drupal security team one of the best I've encountered in OSS. They are on the ball, quick to respond, and know their stuff. In general, Drupal is far more secure for it. They promote good practices (in general).

But bad things happen from time to time. It's the nature of the beast.

There are two ways to look at it:

Use a CMS/Framework, because they are better than you and can fix vulnerabilities quickly, so everyone benefits.
Don't use a CMS/Framework, because any vulnerabilities found can be exploited en masse.
And the truth of it, is that both are correct. From a security standpoint, using a CMS/Framework is both a risk, and a benefit. Like everything when it comes to security, it's a tradeoff. Does that mean you should avoid CMS's and Frameworks? No. What it means is that you need to think and plan on how to mitigate risks.

You're never safe. If you're running a system, it's either been compromised, or will be. The key is how you deal with it.

Posted by Deamwork Android Client.

› 尚无评论。

› 尚无引用通告。

X