Security problem with your Drupal configuration

Today the Drupal Security Team sent out a message in regard to emails being sent to people asking them to install a file on their Drupal server to make sure that some security problem in Drupal Core was plugged before a hacker finds it.

I wonder how many fell for it... probably not many since only the smartest work with Drupal, although there could be a few silly billies out there too!?

The interesting point of the message sent to Drupal users is that it says that the Drupal Security Team did not announce anything on their website. That's contrary to even receiving such a (public) message since those are posted on Drupal and then broadcasted to people who registered to receive those messages.

This being said, the email clearly shows that the Drupal people think some Drupal users could very well fall for it.

Oh! And as a side note on this one... It also shows that Drupal is otherwise quite strong in regard to security since it would not require someone to install a by-pass Trojan script to otherwise break the system. I guess that means I at least made one good choice in my life. 8-)

  * Advisory ID: PSA-2011-001
  * Project: Drupal core and contrib
  * Versions: All versions
  * Date: 2011-February-17
  * Security risk: Not critical

-------- DESCRIPTION  
---------------------------------------------------------

This is a public service announcement regarding a recent social engineering
attack via the following mail purporting to come from the Drupal security
team.
 >Hello, I am a member of the Drupal security team. Our installation records
 >show that your site runs Drupal on PHP [version] and [server]. We have
 >recently found a security problem with that configuration which could allow
 >a hacker to get into the site and delete any posts they want. We have not
 >posted anything about this yet publicly as we want to get this patch out to
 >as many people as possible first. We have developed a patch for this bug -
 >all you need to do is upload this file to your site in the
 >sites/default/files/ folder (do not change the name of the file) and Drupal
 >will see it and install it for you. We recommend you do this as soon as
 >possible. Sincerely, James Drupal security team
The mail was sent with Drupal Security <drupal_s@yahoo.com> as the
(easily-forged) "From" address. It also contained an attachment that was said
to be a patch that had to be uploaded and installed. Needless to say that
this file contained code to make the system accessible from the outside. If
you received a message like the above, do not upload the attached file. How
the Drupal Security Team communicates:
  1) The Security Team does not supply patches to sites.
  2) The Security Team will never ask site administrators to upload random
     files to their site. We only recommend to update to latest core or
     contrib releases downloaded from drupal.org.
  3) The Security Team officially uses three forms of communication for Drupal
     Security Advisories; the update report in your Drupal installation, the
     posts and RSS feed on https://drupal.org/security, and the newsletter
     available from your Drupal.org user page. The Drupal Security Team does
     not publish to a Twitter feed or provide any other official communication
     channel.
  4) The Security Team will never ask for passwords for your host or your
     Drupal install.

If you receive communications from someone saying they are a member of the
Security Team and their request is questionable, please forward the email to
the team at security@drupal.org.
-------- CONTACT  
-------------------------------------------------------------

The security team for Drupal can be reached at security at drupal.org or via
the form at https://drupal.org/contact.

_______________________________________________
Security-news mailing list
Security-news@drupal.org
http://lists.drupal.org/mailman/listinfo/security-news