Remove Core version from install.php when the site already is installed - Information Disclosure - Leaking version information

Created on 6 November 2023, 8 months ago
Updated 12 November 2023, 8 months ago

Problem/Motivation

This was originally logged as a private issue to the security team, but was cleared to be moved to the public queue

Simply visiting a Drupal 8+ website and going to /install.php will tell you the version information of the current installation on set site.

This could be solved by restricting access to /install.php, however by default, most sites don't have this logic in their apache/nginx/... configuration thus this leaves a lot of site vulnerable. It makes the life of an attacker very easy, by knowing the EXACT versionm it's easy to trace down which vulnerabilities are still there to exploit on set site.

Personally I don't see any reason why the version information needs to be displayed in such public maner. In Drupal 7 this also was not the case.

Steps to reproduce

Visit a Drupal 8+ website and go to /install.php

Proposed resolution

Don't show the version information for installed sites, but keep the info for when installing a fresh instance as it might be useful there knowing which version you're installing.

Remaining tasks

  • Create merge request
  • Create change record

User interface changes

N/A

API changes

N/A

Data model changes

N/A

Release notes snippet

The version information will no longer be shown on the Drupal install.php page when the website is already installed. This enhances security by no longer exposing the exact Drupal Core version which is installed for that specific site.

πŸ“Œ Task
Status

Fixed

Version

10.1 ✨

Component
InstallΒ  β†’

Last updated 1 day ago

No maintainer
Created by

πŸ‡§πŸ‡ͺBelgium BramDriesen Belgium πŸ‡§πŸ‡ͺ

Live updates comments and jobs are added and updated live.
  • Security improvements

    It makes Drupal less vulnerable to abuse or misuse. Note, this is the preferred tag, though the Security tag has a large body of issues tagged to it. Do NOT publicly disclose security vulnerabilities; contact the security team instead. Anyone (whether security team or not) can apply this tag to security improvements that do not directly present a vulnerability e.g. hardening an API to add filtering to reduce a common mistake in contributed modules.

Sign in to follow issues

Comments & Activities

Production build 0.69.0 2024