I estimate hundreds of thousands of Drupal websites now have backdoors; between ten and ninety percent of all Drupal websites. Automated Drupageddon exploits were in the wild within hours of the announcement. Updating or patching Drupal does not fix backdoors that attackers installed before updating or patching Drupal. Backdoors give attackers admin access and allow arbitrary PHP execution.
If your Drupal 7 (and 8) website is not updated or patched it is most likely compromised. If your website was not updated within a day of the announcement, it is probably compromised. Even if your website was updated within a day, it may be compromised.
If you did not know, Drupageddon is the highly critical SQL injection vulnerability in Drupal core announced 15 October. It is also known as Drupalgeddon (with an "L"), CVE-2014-3704, Drupal SA core 2014 005 and #DrupalSA05. Drupageddon (no "L") is the original name selected by Stefan Horst, who initially reported to the Drupal security team. See Drupageddon.com.
I have drafted this flowchart to help Drupal website administrators understand their options for recovering from Drupageddon. Review, feedback and collaboration is welcome.
The flowchart is a living document. Currently version is number 7.
|How to fix a Drupal site from Drupageddon, second draft.png||399.63 KB|
|How to fix a Drupal site from Drupageddon, draft 3.png||470.95 KB|
|How to recover from Drupageddon, draft 4.png||581.75 KB|
|How to recover from Drupageddon, transparent draft 5.png||542.35 KB|
|How to recover from Drupageddon, draft 6.png||643.95 KB|
|How to recover from Drupageddon, draft 7.png||651.82 KB|
|How to recover from Drupageddon, version 8.png||634.21 KB|
|How to recover from Drupageddon, version 9.png||639.57 KB|