ArticlePDF Available

A Comparative Study of Web Content Management Systems

MDPI
Information
Authors:

Abstract and Figures

Web Content Management Systems (WCMS) play an increasingly important role in the Internet's evolution. They are software platforms that facilitate the implementation of a web site or an e-commerce and are gaining popularity due to its flexibility and ease of use. In this work, we explain from a tutorial perspective how to manage WCMS and what can be achieved by using them. With this aim, we select the most popular open-source WCMS; namely, Joomla!,WordPress, and Drupal. Then, we implement three websites that are equal in terms of requirements, visual aspect, and functionality, one for each WCMS. Through a qualitative comparative analysis, we show the advantages and drawbacks of each solution, and the complexity associated. On the other hand, security concerns can arise if WCMS are not appropriately used. Due to the key position that they occupy in today's Internet, we perform a basic security analysis of the three implement websites in the second part of this work. Specifically, we explain vulnerabilities, security enhancements, which errors should not be done, and which WCMS is initially safer.
Content may be subject to copyright.
information
Review
A Comparative Study of Web Content
Management Systems
Jose-Manuel Martinez-Caro 1, *, Antonio-Jose Aledo-Hernandez 1, Antonio Guillen-Perez 1,
Ramon Sanchez-Iborra 2ID and Maria-Dolores Cano 1ID
1Department of Information Technologies and Communications, Universidad Politécnica de
Cartagena (UPCT), Edif. Cuartel de Antigones, Plaza del Hospital 1, 30202 Cartagena, Spain;
antonioj.aledoh@gmail.com (A.-J.A.-H.); agp4@alu.upct.es (A.G.-P.); mdolores.cano@upct.es (M.-D.C.)
2Department of Information and Communications Engineering, Universidad de Murcia (UM), Avda.
Teniente Flomesta, 5, 30003 Murcia, Spain; ramonsanchez@um.es
*Correspondence: jmmc0@alu.upct.es; Tel.: +34-968-328-871
Received: 15 December 2017; Accepted: 25 January 2018; Published: 27 January 2018
Abstract:
Web Content Management Systems (WCMS) play an increasingly important role in the
Internet’s evolution. They are software platforms that facilitate the implementation of a web site
or an e-commerce and are gaining popularity due to its flexibility and ease of use. In this work,
we explain from a tutorial perspective how to manage WCMS and what can be achieved by using
them. With this aim, we select the most popular open-source WCMS; namely, Joomla!, WordPress,
and Drupal. Then, we implement three websites that are equal in terms of requirements, visual
aspect, and functionality, one for each WCMS. Through a qualitative comparative analysis, we show
the advantages and drawbacks of each solution, and the complexity associated. On the other hand,
security concerns can arise if WCMS are not appropriately used. Due to the key position that they
occupy in today’s Internet, we perform a basic security analysis of the three implement websites in
the second part of this work. Specifically, we explain vulnerabilities, security enhancements, which
errors should not be done, and which WCMS is initially safer.
Keywords:
web content management systems; websites; web pages; security; joomla!; wordpress;
drupal; internet
1. Introduction
The Internet is more alive than ever: the number of websites on the Internet has already exceeded
one billion [
1
], the number of Internet users has achieved almost four billion [
2
], and the penetration
rate is more than 51.7% [
2
]. By observing the growth trend during recent years (see Figure 1), we
could come to the conclusion that this evolution is entering a permanent phase, i.e., a linear instead
of an exponential increase. However, if we check other statistics, we find that 60% of Small and
Medium Businesses (SMB) do not have a corporate website [
3
]. As a consequence, there is still much
room for growth, and Web Content Management Systems (WCMS) facilitate this task. WCMS are
software platforms generally used when a website is needed, commonly requiring different user
roles, but when at the same time there is a lack of web programming knowledge [
4
7
]. As a tool,
WCMS are booming, being very helpful for beginners in web development or for small business
managers, because websites can easily be implemented at a relative low cost [
8
,
9
]. One example
could be a newspaper editorial, where journalists are interested in launching an online edition. In this
case, journalists may not know enough about web programming to develop their website, having
only office software skills. It is in this scenario that WCMS have great potential. The open-source
WCMS, also called second-generation WCMS, are platforms often based on PHP (PHP Hypertext
Preprocessor) and usually fed by communities of users who contribute novel solutions and new
Information 2018,9, 27; doi:10.3390/info9020027 www.mdpi.com/journal/information
Information 2018,9, 27 2 of 15
functionalities [
11
]. The basic WCMS structure has the following parts: (i) the files of the content
manager; (ii) a hosting provider to store the files of the content manager; and (iii) a linked database,
e.g., MySQL (My Structured Query Language), to store website information. A WCMS provides an
administration or development area called the back-end, where articles, functionalities, or any other
aspect can be added, deleted, or modified. On the other hand, the visible part of a website, i.e., what a
visitor sees, is called the front-end.
Information 2018, 9, x 2 of 14
Hypertext Preprocessor) and usually fed by communities of users who contribute novel solutions
and new functionalities [11]. The basic WCMS structure has the following parts: (i) the files of the
content manager; (ii) a hosting provider to store the files of the content manager; and (iii) a linked
database, e.g., MySQL (My Structured Query Language), to store website information. A WCMS
provides an administration or development area called the back-end, where articles, functionalities,
or any other aspect can be added, deleted, or modified. On the other hand, the visible part of a
website, i.e., what a visitor sees, is called the front-end.
Figure 1. Internet users and penetration worldwide, 2001–2021 (billions, % of population); data
shown as * are expected values [10].
Security vulnerabilities are a weak point of any system at the design and implementation levels,
and WCMS are not an exception [9]. Bugs and flaws are both software problems differing in terms of
the level at which they are presented (implementation and design, respectively); in any case, they are
dangerous, and should be analyzed [12]. In a simplified way, an attack consists of two phases:
discovery, which is longer in time, and exploitation, once the weakness of the WCMS is known [13].
A secure application ensures authentication, confidentiality, integrity, and availability. Depending
on the service we are focusing on, we could put aside some of these security characteristic (e.g.,
confidentiality). However, WCMS are a key piece of today’s Internet, and have become a target for
attackers [14,15]. If a WCMS has security vulnerabilities, it may become inaccessible [16], with the
corresponding negative effects. Usual attack consequences are: confidential data destruction, data
modification, misuse of a web-server for illegal activities, and Denial-of-Service (DoS), among
others.
Due to the key position that WCMS occupy in today’s Internet, and the security concerns that
can arise with an inappropriate use or configuration, the goal of this article is twofold. Firstly, we
extend the work carried out in [17], explaining how to manage a WCMS from a tutorial perspective,
and what can be achieved with its use. In order to do so, we have chosen the best WCMS in terms of
popularity and performance [18–21]; namely, WordPress [22], Joomla! [23], and Drupal [24].
Regarding popularity, while only 23.6% of web pages were created with a WCMS in January 2011,
this figure increased to 48.8% in January 2018 [19]. In 2011, 13.1% of the websites were implemented
with WordPress, 2.6% with Joomla!, and 1.4% with Drupal. In 2018, the most used WCMS is
WordPress (29.3%), the second preferred option is Joomla (3.2%), and the third one is Drupal (2.3%).
In other words, WordPress has a market share of 60% in January 2018, followed by Joomla! and
Drupal with 6.5% and 4.6%, respectively [18]. In terms of performance, the works done in [20,21]
compared several WCMS and both studies emphasized that WordPress, Joomla!, and Drupal were
the most efficient ones, because they achieved a better load time and good static content, showed the
Figure 1.
Internet users and penetration worldwide, 2001–2021 (billions, % of population); data shown
as * are expected values [10].
Security vulnerabilities are a weak point of any system at the design and implementation levels,
and WCMS are not an exception [
9
]. Bugs and flaws are both software problems differing in terms
of the level at which they are presented (implementation and design, respectively); in any case, they
are dangerous, and should be analyzed [
12
]. In a simplified way, an attack consists of two phases:
discovery, which is longer in time, and exploitation, once the weakness of the WCMS is known [
13
].
A secure application ensures authentication, confidentiality, integrity, and availability. Depending
on the service we are focusing on, we could put aside some of these security characteristic (e.g.,
confidentiality). However, WCMS are a key piece of today’s Internet, and have become a target for
attackers [
14
,
15
]. If a WCMS has security vulnerabilities, it may become inaccessible [
16
], with the
corresponding negative effects. Usual attack consequences are: confidential data destruction, data
modification, misuse of a web-server for illegal activities, and Denial-of-Service (DoS), among others.
Due to the key position that WCMS occupy in today’s Internet, and the security concerns that can
arise with an inappropriate use or configuration, the goal of this article is twofold. Firstly, we extend
the work carried out in [
17
], explaining how to manage a WCMS from a tutorial perspective, and what
can be achieved with its use. In order to do so, we have chosen the best WCMS in terms of popularity
and performance [
18
21
]; namely, WordPress [
22
], Joomla! [
23
], and Drupal [
24
]. Regarding popularity,
while only 23.6% of web pages were created with a WCMS in January 2011, this figure increased to
48.8% in January 2018 [
19
]. In 2011, 13.1% of the websites were implemented with WordPress, 2.6%
with Joomla!, and 1.4% with Drupal. In 2018, the most used WCMS is WordPress (29.3%), the second
preferred option is Joomla (3.2%), and the third one is Drupal (2.3%). In other words, WordPress
has a market share of 60% in January 2018, followed by Joomla! and Drupal with 6.5% and 4.6%,
respectively [
18
]. In terms of performance, the works done in [
20
,
21
] compared several WCMS and
both studies emphasized that WordPress, Joomla!, and Drupal were the most efficient ones, because
they achieved a better load time and good static content, showed the highest number of installations,
Information 2018,9, 27 3 of 15
presented better documentation support, etc. Although Joomla! and Drupal have lost some relevance,
they are still widely used as shown in [
25
], what justifies choosing them for this comparative work.
The methodology followed for the comparison consists of creating three equal web sites, each one
with a different WCMS. The advantages and drawbacks of each selected WCMS, as well as their
complexity, will be discussed. Secondly, we carry out a basic security analysis of each implemented
website, reporting vulnerabilities, how to bestow security on them, which mistakes can be avoided,
and which WCMS is initially safer.
The rest of the paper is organized as follows. Section 2includes the related work. In Section 3,
all details about the selected WCMS are discussed. Section 4provides a guide to how to create a
website using Joomla!, Drupal, and WordPress, as well as a qualitative comparison. Section 5presents
the outcomes of the basic security analysis. The document ends with the conclusion.
2. Related Work
There are several works in the related literature addressing operation, performance, and security
in WCMS. According to [
7
] and [
8
], WCMS stood out because a quick design is possible by using
frameworks and templates. Additionally, both studies highlighted the integration of information and
knowledge and high levels of efficiency and usability as the main advantages of WCMS. Patel et al.
compared, in [
20
,
26
], several WCMS, trying to identify the proper scenario for each WCMS. The authors
in [
21
] introduced a comparative study of seven WCMS, including Drupal, Joomla!, and WordPress.
However, the comparison was based only on implementing a website with each WCMS and on
determining if a pre-established functionality, defined as a previous requirement, was available or not.
In [
27
], an exhaustive analysis of WCMS was presented, but from a purely qualitative perspective.
They addressed other properties of WCMS, such as the effect of the web-server on the performance
(e.g., Apache, Nginx, etc.) according to available statistics.
On the other hand, most WCMS vulnerabilities are found in plugins and extensions (80%), and
once any vulnerability is known, hackers could be able to inject malware on web-servers [
9
]. The studies
done in [
16
,
27
] introduced and analyzed security in WCMS. In particular, authors identified in [
16
]
the vulnerabilities and attacks that WCMS are exposed to, and proposed possible countermeasures.
As a case study, they used Joomla! and Drupal (with earlier versions than those used in this work),
and carried out simple penetration tests using the tools WebScarab [
28
] and TamperData [
29
]. As the
main result, the authors concluded that even though security mechanisms were provided, both WCMS
could easily become victims of attacks. An interesting tool called ZenIDS was presented in [
30
] to
identify malicious activities in PHP applications and to protect them. To perform this task, the process
distinguishes two phases: feature learning, and monitoring. Finally, authors in [
31
] computed a
web-server’s risk factors when cybercriminals use Apache, Nginx, or Microsoft IIS, among others.
They also included the effect of running the most popular WCMS platforms with up-to-date versions
on those web-servers, finding that recent versions were more compromised than less-popular WCMS
platforms or outdated versions. The more add-ons or extensions that are included in a WCMS
platform, the more the negative impact on security. As will be discussed later, our work updates [
16
]
and contributes in a practical way to the results obtained in [27].
3. Web Content Management System under Study
Joomla! [
23
] is one of the most popular WCMS for creating dynamic websites [
25
]. Joomla! is
compatible with MySQL, SQL Server, and PostgreSQL databases. One of the key features of Joomla! is
that it offers the widest range of functionalities, such as picture galleries, forums, chats, blogs, news,
etc. Likewise, Drupal [
24
] is also aimed at creating dynamic websites. It presents high compatibility
with different databases. Security, fast loading, and a wide variety of user roles are the main Drupal
features; as an example of the last characteristic, Drupal allows us to limit access of a specific user such
that they are only able to modify the properties of a certain functionality, and even to modify only
particular parameters of that functionality. On the other hand, WordPress [
22
] was initially oriented
Information 2018,9, 27 4 of 15
towards creating blogs, but has evolved to provide web applications and e-commerce solutions. One
key feature of WordPress is its great Search Engine Optimization (SEO) positioning. The reason for
this is that WordPress has many plugins to improve a quick inclusion in search engines, compared
with other WCMS [
32
]. Moreover, it is possible to create a simple blog for free under the platform
subdomain (.wordpress.com). Extensions and modules can also be used in Joomla! and Drupal to
achieve a better SEO, but these options do not have such a high impact as WordPress. All WCMS
platforms offer to improve SEO manually. At the time of carrying out this work, the latest available
versions were: Joomla! 3.6.5, WordPress 4.6.2, and Drupal 7.54. Tables 13include a brief comparison
of the features of each version.
There are many differences among the three selected WCMS. There are many possible scenarios
but, generally speaking, websites start with a reduced size and they do not involve too many
characteristics, modules, or contents. Over time, the increase in website visitors, new developed
content, sales volume, etc., generates the need to add new modules and extensions to the website,
giving it more capabilities. WordPress offers many extensions to insert a specific functionality, but it
does not have the wide range of functionalities that Joomla! has. Additionally, WordPress includes
the option to add integrated extensions to the management environment. Lastly, Drupal is the most
complex WCMS in terms of extending its capabilities, because a specific functionality can have
dependencies from different libraries or functions, making this extension process long and tedious.
The same applies to the functionality range, where Joomla! and WordPress have a large number of
functions to extend the website. In contrast, this option is more limited with a Drupal implementation.
Repositories are very important for updating WCMS, implementing new functionalities, and improving
the existing ones. These repositories can be distributed, which is the case of Joomla! and WordPress,
or centralized, such as in the case of Drupal. The largest user communities belong to Joomla! and
WordPress, and hence they have a very active user community and excellent documentation. On the
other hand, the Drupal user community is limited, because it is more complex to implement and
manage, having, as a result, a limited documentation compared to the others. In contrast, Drupal’s
complexity allows a higher diversity of user roles, which is an advantage compared to Joomla! and
WordPress. Table 4summarizes the main features of the three selected WCMS. The comparison has
been done based on available official documentation, previous studies from the related literature, and
the experimental work carried out in this paper.
Table 1. WCMS: Comparison of Joomla! versions and features.
Version New Features
1.0
UTF-8 Built-in, Database Drivers, Official Supported Components Already in the Core, Plugin
Framework, FTP Uploading of Extensions, Visible to Administrators when the Website is Offline,
SQL Injection and XSS Solutions, HTTPS, Include CHANGELOG.php File for More Information,
Media Manager Support for XCF, ODG, ODT, ODS, ODP File Formats and New Menu to Clear
All Caches
1.5 Support GIF Images, LDAP Security Fix, SEO Improvement, RSS Feed, Solve XSS, DoS and SQL
Injection Vulnerabilities in Back-end and Front-end Editing
2.5 (1.6 & 1.7)
Smart Search Engine, New Database Supports, Captcha by Default, URLs and Images Fields,
Admin Notification—New User Creation, Notes into Users and Menu Items, Customized Text
Filter, News Feed Flexible Sequence, Translation Edition from Language Manager, Automatic
Offline Website after Installation, Customized Offline Website Image, Status Bar, Online User
Status, Native ZIP Support, New SEO System Plugin and New Debugging Plugin Interface
3.6.5
Responsive Built-in Feature, Bootstrap, Installation Process Simplified in Only 3 Steps,
reCAPTCHA, Content Version Control, Extension Finder, PHP 7 Support, Article
Manager—Better Organized and more Available Options, Drag-and-Drop Images, One-click
Extension Installation, Update Notifications via Email, Log Folder, Two-Step Authentication and
Higher Password Security, ACL into Menu, JLayout Integration, Inverse Cache, Back-end Menu
Manager and Custom Fields
Information 2018,9, 27 5 of 15
Table 2. WCMS: Comparison of WordPress versions and features.
Version New Features
0.7 New Administration Interface, Private Posts and Geographical Data Support
1.0 Multiple Categories, Comment Moderation, User Creation from Admin Page and Edit
Page and Comment link
1.2
Plugin Architecture, Sub-Categories, Post Preview, Unlimited Update Services, Custom
Fields, Directory Flexibility, Encrypted Password, Comment Management Tools and Solve
Login Problems
1.5 Security Issues (XSS and SQL Injection), Templates, Site Customization and “Save and
Continue” Button
2.0 Redesigned Backend, Faster Posting, Image and File Uploading, New User Roles and
Capabilities, Database Versioning and Theme and Header Customization
2.1 AutoSave, Spell-Checking into Editor, New Search Engine, Redesigned Login Screen and
More Efficient Database Code
2.2 New Widgets, Infinite Comment Stream and Speed Optimization
2.3
Native Tagging Support, New Update Notification, Canonical URLs and Pending Review
Feature for Multi-Author Blogs
2.4 More Widgets and Cleaner, Faster and Less Cluttered Dashboard
2.8 Faster to Use, Ease of Installation, Redesigned Widgets Interfaces and Screen Options on
Every Page
2.9
Built-in Image Editor, Easier Video Embeds, Global Undo/“trash” Feature and Update and
Compatibility Checking
3.0 Lighter Interface, Contextual Help on Every Screen, 1217 Bug Fixes and Feature
Enhancements
3.1 Redesigned Linking Workflow, Admin Bar, Post Formats Support, New WCMS
Capabilities, New Network Admin and Advanced Taxonomy and Custom Fields Queries
3.2 Refreshed Dashboard Design, New Post Editor Design—Distraction Free and Rotating
Header Images
3.3 Drag-and-Drop Uploader and Pointer Tips
3.4 Theme Customizer and Thirty-part Embedded Box
3.5 Re-imagined Flow for Uploading Multimedia Content and Dashboard Style Refresh
(Retina Ready)
3.6 Revamped Revisions, Post-Locking, Augmented AutoSave, HTML Media Player and
Menu Editor Easier to Understand and Use
3.7 Maintenance and Security Updates While Sleep, Better Global Support and Stronger
Password Recommendations
3.8 Modern Aesthetic, Clean Typography, Refined Contrast, High Definition at High Speed,
Admin Color Schemes and Smoother Widget Experience
3.9 Improved Visual Editing, Edit Images Easily and Gallery Previews
4.0 New Multimedia Management, Ease of Use of Embedded Multimedia and New Plugin
Search Engine
4.1 Auto-Detected Language and Plugin Recommendations Section
4.2 Easier Way to Share Content and Extend Character Support
4.3
Menus in the Customizer, Formatting Shortcuts, Stronger Password Generation when New
User is Generated
4.4 Responsive Images, Embed Everything and REST API Infrastructure
4.5 Live Responsive Previews, Custom Logos and Smart Image Resizing
4.6.2 Native Fonts, Inline Link Checker and Content Recovery
Information 2018,9, 27 6 of 15
Table 3. WCMS: Comparison of Drupal versions and features.
Version New Features
1.0 Initial Release
2.0 FAQ Module, Multi-Lingual Website Option, Multiple Vhosts, Search Functionality in
Administration Pages, Multiple Directories, Sections and Section Manager
3.0 Book, CVS, Help, Page, Moderate, Statistics, System, Poll, Blog and Access Modules
4.0 Blogger API, Tracker and Weblogs Modules and Support for External SMTP Libraries
4.1 Throttle, Profile and Taxonomy Module and Pager Support to the Main Page and
Offline Mode
4.2 Support for Clean URLs and Better Installation Instructions
4.3 Support for Configurable URLs, Multiple Sessions per User, Anonymous Session,
Mass Node Operations and Optimization of Many SQL Queries
4.4 Automatic Disabling Module or Blocks under Heavy Load and Improve Memory and
Footprint Performance
4.5
Reorganize the Navigation Menu, Add Recent Comment Block, Tabs and SubTabs,
Possible to Track Forum Topic and Support for Uploading Documents, Database
Connections and Using Multiple Inputs Formats
4.6 PHP 5 Compliance, Add Flow Control Mechanism and Categories to RSS Feeds, Contact
Module and Security Issues (XSS, DoS, and CSRF)
4.7
Free Tagging Support, Auto-Complete Forms (AJAX), Resizable Text Fields (JS),
IP Black-List, Customizable Result Ranking, Support for External URLs and New
Security Issues
5 Retooled Administration Page, Web-Based Installer and New Security Issues
6New, Faster and Better Menu System and Email Notification to Approved, Blocked or
Delete Users
7.54
Support for SQLite Database Engine, Limited Login Attempts to Prevent Brute-Force
Password Guessing, Drag-and-Drop Positioning for Input Format, Language and Pool
Listing, Administration Role, Stronger Password Validator and Time Zone
Table 4. Qualitative comparison of Joomla!, WordPress, and Drupal.
Feature Joomla! Drupal WordPress
Main content type Websites, online apps Blog
Blog, e-commerce, online apps
Extension availability High Middle High
Functionality range High Middle High
Extension repository Distributed Centralized Distributed
Documentation Excellent Good Excellent
User community Very active Limited Very active
Ease of use Simple Complex Simple
User role personalization Middle Very High Middle
Manual SEO positioning Yes Yes Yes
Automatic SEO positioning Extensions Modules Plugins and tools
4. Creating a Website with Joomla!, Drupal, and WordPress
To compare the three WCMS under study, and to provide a good understanding of their operation,
the same website is going to be created using Joomla!, then Drupal, and finally WordPress. The website
should follow the graphical distribution shown in Figure 2and should have the functionalities
enumerated below:
Information 2018,9, 27 7 of 15
A homepage slider or banner, based on JavaScript.
A login module, allowing user registration and creating private areas on the website.
Social network integration; Twitter and Facebook.
A multi-language module, content translation based on Google Translator.
A search module, to find indexed content in the website.
A contact form.
Videos.
Maps.
A downloads section, customized multi-user downloads.
A newsletter, so users are aware of recent news by mail
Events, as a way to place important news into the website homepage.
Information 2018, 9, x 6 of 14
4.5
Reorganize the Navigation Menu, Add Recent Comment Block, Tabs and SubTabs, Possible to Track
Forum Topic and Support for Uploading Documents, Database Connections and Using Multiple
Inputs Formats
4.6 PHP 5 Compliance, Add Flow Control Mechanism and Categories to RSS Feeds, Contact Module
and Security Issues (XSS, DoS, and CSRF)
4.7 Free Tagging Support, Auto-Complete Forms (AJAX), Resizable Text Fields (JS), IP Black-List,
Customizable Result Ranking, Support for External URLs and New Security Issues
5 Retooled Administration Page, Web-Based Installer and New Security Issues
6 New, Faster and Better Menu System and Email Notification to Approved, Blocked or Delete Users
7.54
Support for SQLite Database Engine, Limited Login Attempts to Prevent Brute-Force Password
Guessing, Drag-and-Drop Positioning for Input Format, Language and Pool Listing, Administration
Role, Stronger Password Validator and Time Zone
Table 4. Qualitative comparison of Joomla!, WordPress, and Drupal.
Feature
J
oomla! Drupal WordPress
Main content type Websites, online apps Blog Blog, e-commerce, online apps
Extension availability High Middle High
Functionality range High Middle High
Extension repository Distributed Centralized Distributed
Documentation Excellent Good Excellent
User community Very active Limited Very active
Ease of use Simple Complex Simple
User role personalization Middle Very High Middle
Manual SEO positioning Yes Yes Yes
Automatic SEO positioning Extensions Modules Plugins and tools
4. Creating a Website with Joomla!, Drupal, and WordPress
To compare the three WCMS under study, and to provide a good understanding of their
operation, the same website is going to be created using Joomla!, then Drupal, and finally
WordPress. The website should follow the graphical distribution shown in Figure 2 and should have
the functionalities enumerated below:
A homepage slider or banner, based on JavaScript.
A login module, allowing user registration and creating private areas on the website.
Social network integration; Twitter and Facebook.
A multi-language module, content translation based on Google Translator.
A search module, to find indexed content in the website.
A contact form.
Videos.
Maps.
A downloads section, customized multi-user downloads.
A newsletter, so users are aware of recent news by mail
Events, as a way to place important news into the website homepage.
(a) (b)
Figure 2.
(
a
) Some desirable elements to integrate into the three versions of the website; (
b
) Functionalities
provision and graphical appearance.
The first step in starting the website implementation is the installation process. In order to do so,
the recommended steps are the same for all WCMS:
Hire a hosting provider service (e.g., 1and1.com) that includes a database (e.g., MySQL).
Create the WCMS database.
Download the WCMS installation package from the official website and extract the files into the
virtual directory given by the hosting provider.
Install the WCMS using the installation wizard, which links with the database.
On the other hand, the WCMS configuration and customization process usually follows the next
pattern. Firstly, it is necessary to download or to design the website template, e.g., with a template
editor such as Artisteer [
33
]. Then, the template should be assigned to the website, for instance
using the template manager. Secondly, it will be necessary to look for extensions to add the required
functionalities. Once found, these extensions need to be enabled and located on the website. Before
setting up the template, it is important to check available sections or areas so that those functionalities
will be placed in the desired position. Finally, content should be added using the provided editors. Each
WCMS usually has its own editor tool for inserting multimedia content or text. Table 5summarizes the
similarities and differences found during the implementation of the websites using Joomla!, WordPress,
and Drupal. The Yoo Downtown template was selected for Joomla! and WordPress, whereas the AT
commerce template was chosen for Drupal. Note that the selected templates incorporate their own
framework for changing block positions and size, page width, fonts, colors, etc. This is highly useful,
because it allows a high level of customization, and therefore, a similar visual aspect can be achieved
with the three WCMS. Artisteer [
33
] is a software tool whose goal is to customize the website in a very
intuitive way, modifying the visual aspect as required. Once the changes have been done, the user can
Information 2018,9, 27 8 of 15
export the template as a .zip file ready to be installed in the web-content manager. Regarding header
and footer, the Artical module for Joomla! transforms an article made with the editor into a module to
be placed wherever the designer considers appropriate on the website. Drupal and WordPress natively
integrate this option.
Table 5.
Detected similarities and differences between WCMS in implementing website functionalities.
Functionality Joomla! Drupal WordPress
Own template developer Artisteer Artisteer Artisteer
Used template Yoo Downtown AT commerce Yoo Downtown
Header and footer Artical module Incorporated into template Incorporated into template
Picture slider Nivo Incorporated into template Incorporated into template
Social networks ITPsocialbuttons
Linksalpha website provides
social code.
Linksalpha website provides
social code.
Translation GTranslate GTranslate GTranslate
Events JNews Recent content section Permanent links widget
Download manager Jdownloads File Downloader Wordpress Download Manager
Newsletter Mailchimp Website Mailchimp Website Mailchimp Website
Contact form CKForms Incorporated into kernel CformsII
Module developer Jumi - -
Entries editor JCE Own Own
YouTube, Twitter and Maps Inserting HTML code
provided by official websites
Inserting HTML code
provided by official websites
Inserting HTML code provided
by official websites
Search and login Incorporated into kernel Incorporated into kernel Incorporated into kernel
A home-page slider is a good choice for implementing a website with an attractive look. The slider
with Drupal needs an additional library called jquery.cycle.all.js to work properly. With WordPress,
it is necessary to include the returned configuration code into the post (or page) to show the slider.
For both WCMS, the picture dimensions and the route where the pictures are located need to be set.
On the other hand, Nivo [
34
] is the module used to incorporate the slider into the Joomla! website.
Regarding the social-networks buttons, there are websites such as Linksalpha [
35
] that return the
necessary code to be inserted into a new website section, which has been very useful with Drupal
and WordPress. As before, Joomla! does not share the same implementation process, opting in this
case for the ITPsocialbuttons module [
36
]. As expected, when users click on one of these buttons, they
will be forwarded to the corresponding social network account to publish a website recommendation.
Focusing on the web users, they should be able to choose the website language (for all web content).
To do so, we have employed the Google Translator [
37
] module. By using this module, it is only
necessary to indicate which languages will be offered and the default website language. Google
Translator is widely considered a powerful tool able to provide a desirable service in the three WCMS
under study. Multimedia resources are needed to build an appealing website. The easiest method to
insert multimedia from YouTube, Twitter, or Maps is pasting the embedded HTML code provided by
official websites into the corresponding website section. Other modules included by default in the
website kernel are search and login, with each WCMS having its own implementation. It is highly
recommended to read the documentation before implementing the module for each platform.
Events and events management are also of interest in our website. Each WCMS uses a different
module or widget to incorporate the events. The Joomla! module has been configured in a way
whereby it is possible to select which article identifiers should be highlighted as the most important
ones. WordPress uses a permanent link widget to paste the links for interesting events; please note that
when a new page is created in WordPress, a permanent link is always returned. However, Drupal uses
a so-called recent content section to manage which pages from the website are also going to be considered
as events. The download manager tool employed by Joomla! is Jdownloads [
38
]. Mailchimp [
39
] is
the chosen method to create the newsletter on WordPress, Joomla!, and Drupal. Mailchimp websites
return predefined code text to be inserted into the website; hence, users can subscribe to the latest
news via e-mail. The contact form is the section that requires more configuration and customization
because labels, text-boxes, text-areas, submit, and reset buttons should be implemented, as well as
Information 2018,9, 27 9 of 15
setting configuration parameters, such as the e-mail recipient of the queries. We decided to exchange
the default Joomla! editor for one more comprehensive and complete, which allows multimedia
integration; namely, JCE. Finally, the corresponding articles are selected to appear on the homepage of
the three websites. Based on this work, and from a qualitative perspective, Joomla! offers the most
intuitive solution in terms of content management administration and functionalities, Drupal presents
the highest complexity in management, and WordPress has the advantage of providing functionalities
from its own back-end.
5. Basic Security Analysis
As we mentioned in Section 1, WCMS are becoming a common target for attackers, raising
important security concerns. Possible WCMS threats are [40,41]:
Data manipulation: violating data integrity, e.g., Structured Query Language (SQL) injection and
parameter manipulation.
Confidential data: when an unauthorized person has access to sorted data, e.g., SQL injection and
Cross-Site Scripting (XSS).
Phishing: a special confidential data-gathering method using forms and spam mails.
Spam: using email addresses published on the website.
Execution of code, run scripts, or programs on a web-server using WCMS vulnerabilities.
Analyzing the information shown in Figure 3[
42
], JavaScript and PHP are the programming
languages with the most vulnerabilities, generating a high amount of security weaknesses.
Technologies and frameworks based on Java are less vulnerable; in cases of vulnerability, this is
usually because of poor component or framework patching. Packages such as JQuery in PHP and
JavaScript are also a source of vulnerabilities. Despite being the most used web-server software,
Apache [
43
] can present several vulnerabilities due to poor configurations and patching policies. At the
application layer, 61% of attacks are made through a web-browser. 86% of those web-browser attacks
correspond to an XSS attack, thus constituting a vast majority. In an XSS attack, a mischievous user
finds a means to insert a malicious code fragment into the website [
16
]. That is, an XSS attack injects
a malicious sequence of commands into a trusted website executed on the visitor’s web-browser
(without the visitor’s knowledge), and therefore, the attacker has access to sensitive user data, such
as session tokens and cookies, stored in the browser [
44
]. Some variations of the XSS attack are the
following:
Reflected XSS attack: This attack uses other routes to reach the victims, such as email messages with
crafted links or other websites, which reflect the attack back to the user’s web-browser. The script
is executed by the web-browser because it comes from a trusted server”. This type of attack is
also known as Non-Persistent or Type-II XSS [45].
Stored XSS attack: The malicious script is stored somewhere on the web-server (e.g., a database,
a forum message, logs, comments, etc.) and is sent to the victim when it requests the query.
This attack type is also called Persistent or Type-I XSS [45].
DOM-Based (Document Object Model) attack: In contrast to previous types, in this one, the injection
is performed by the user into the web-page when the server script processes user data and injects
it back into the website [46].
Another common attack is SQL injection [
47
]. In this case, a malicious user accesses a website
database, and is able to modify it. Databases are fundamental for implementing websites using WCMS.
Databases store large volumes of information, in many cases valuable information, and are a common
target for malicious users. To perpetrate an SQL injection attack, the website must have an input to
write an SQL query. Then, the website should include the attacker input data as an SQL statement
into the application without any verification, so this statement could be an SQL query and be run
against a database server [
48
,
49
]. If the attack is successful, confidential and sensitive data could be
Information 2018,9, 27 10 of 15
read, modified, or even deleted. Moreover, the attacker could execute administration operations on the
database and obtain the database structure information. SQL injection errors occur when the executed
program is from a non-verified source or SQL queries are formed dynamically [
47
]. While an SQL
injection is directed to the query function that interacts with the database, XSS attacks take advantage
of the output HTML function that sends data to the browser. In any case, most attacks can result in a
total system-wide compromise [42].
Information 2018, 9, x FOR PEER REVIEW 9 of 14
Apache [43] can present several vulnerabilities due to poor configurations and patching policies. At
the application layer, 61% of attacks are made through a web-browser. 86% of those web-browser
attacks correspond to an XSS attack, thus constituting a vast majority. In an XSS attack, a
mischievous user finds a means to insert a malicious code fragment into the website [16]. That is, an
XSS attack injects a malicious sequence of commands into a trusted website executed on the visitor’s
web-browser (without the visitor’s knowledge), and therefore, the attacker has access to sensitive
user data, such as session tokens and cookies, stored in the browser [44]. Some variations of the XSS
attack are the following:
Reflected XSS attack: This attack uses other routes to reach the victims, such as email messages
with crafted links or other websites, which reflect the attack back to the user’s web-browser.
The script is executed by the web-browser because it comes from a trusted server”. This type of
attack is also known as Non-Persistent or Type-II XSS [45].
Stored XSS attack: The malicious script is stored somewhere on the web-server (e.g., a database,
a forum message, logs, comments, etc.) and is sent to the victim when it requests the query. This
attack type is also called Persistent or Type-I XSS [45].
DOM-Based (Document Object Model) attack: In contrast to previous types, in this one, the
injection is performed by the user into the web-page when the server script processes user data
and injects it back into the website [46].
(a)(b)(c)
Figure 3. (a) Likelihood of a vulnerability being discovered by framework or language; (b)
Likelihood of a vulnerability being discovered at the application layer; (c) Distribution of types of
browser attacks. Data extracted from [42].
Another common attack is SQL injection [47]. In this case, a malicious user accesses a website
database, and is able to modify it. Databases are fundamental for implementing websites using
WCMS. Databases store large volumes of information, in many cases valuable information, and are a
common target for malicious users. To perpetrate an SQL injection attack, the website must have an
input to write an SQL query. Then, the website should include the attacker input data as an SQL
statement into the application without any verification, so this statement could be an SQL query and
be run against a database server [48,49]. If the attack is successful, confidential and sensitive data
could be read, modified, or even deleted. Moreover, the attacker could execute administration
operations on the database and obtain the database structure information. SQL injection errors occur
when the executed program is from a non-verified source or SQL queries are formed dynamically
[47]. While an SQL injection is directed to the query function that interacts with the database, XSS
attacks take advantage of the output HTML function that sends data to the browser. In any case,
most attacks can result in a total system-wide compromise [42].
15%
7%
14%
22%
24%
12%
6%
Java
WordPress
.Net
PHP
JavaScript
Apache
Others
1%
3%
4%
4%
9%
17%
61%
1%
Insecure Deployment
Information Leakage
Authorisation
Injection Attacks
Session Management
Cryptography
Browser Attack
Availability
5%
2%
3%
1%
3%
86%
CSRF
Open Redirection
HTML Injection
Response Splitting
DOM Vulnerabilities
XSS
Figure 3.
(
a
) Likelihood of a vulnerability being discovered by framework or language; (
b
) Likelihood
of a vulnerability being discovered at the application layer; (
c
) Distribution of types of browser attacks.
Data extracted from [42].
In this scenario, there are several security recommendations that should always be followed when
working with WCMS:
Make regular WCMS backups (files and database).
Hire professional hosting providers, which are safer against SQL injection attacks.
Use the most recent versions of WCMS and plugins.
Employ specific security plugins, such as JHackGuard for Joomla!, that provide extra security.
Limit the access to administration files and folders.
Remove the installation script (install.php on Drupal and installation folder on Joomla!).
Modify default passwords and define safe user roles.
Enable captcha for unregistered users avoiding spam.
Hide email addresses to avoid unsolicited spam.
Activate URLs-friendly.
Change the default global website parameters configuration.
Change the default database prefix during the installation process (if possible).
Avoid showing sensitive information about the WCMS in the front-end.
Nevertheless, complying with these suggestions is not enough. Vulnerability assessment and
penetration testing, a process also known as pentesting, have become a valuable tool for evaluating
security in a wide variety of systems and devices by simulating attacks. More specifically, the aim of a
vulnerability assessment is scanning, i.e., to perform network discovery, network port, and service
identification for a system or device, trying to find inadequate security measures and vulnerabilities.
On the other hand, penetration testing goes a step further, being defined by the National Institute
of Standards and Technology (NIST) as the tester being able to “simulate the actions of a given class
Information 2018,9, 27 11 of 15
of attacker by using a defined set of documentation (i.e., the documentation representative of what
that class of attacker is likely to possess) and working under other specific constraints to attempt
to circumvent the security features of an information system” [
50
]. Depending on the previous
knowledge that the tester has about the target, three pentesting categories can be identified; namely,
white-box, gray-box, and black-box testing. The color of the test is inversely proportional to the amount
of knowledge the tester has about the system being evaluated. For instance, in a black-box test no
knowledge is assumed about the implementation or configuration of the target, whereas in a white-box
test a high amount of information is known (e.g., operating system, source code, etc.).
In this work, we performed a basic security analysis on the websites implemented with Joomla!
and Drupal. The website implemented with WordPress was not included in this preliminary
analysis, and was left for future work. To carry out the security analysis, we used the Acunetix
software [
51
], an intuitive and automated tool for auditing website security. Acunetix automatically
crawls the specified website, carrying out both black-box and gray-box hacking to discover threatening
vulnerabilities that can compromise a website and its data. The testing process was as follows.
We employed Windows as our operating system. Once Acunetix was installed, the first step was
choosing the option New Scan, and the program launched a wizard to enter all the testing configuration
parameters, e.g., scan type, target, crawling options, scan options, and login. In the scan type window,
we opted to scan a single website and introduced the website URL. In the second step, we added some
information about the target, such as operating system, web-server, server banner, etc., although most
parameters were automatically completed. The crawling configuration was set by default in this scan.
In the Scan Options section, we selected the scanning profile with a list of vulnerabilities that the target
will be scanned for; in our study, this was XSS and SQL injection. The selected scanning mode was
Heuristic, enabling Port Scanning and AcuSensor Technology. The Login section asked about HTTP
or HTML authentication to login and scan the protected site. It was necessary to show the scanner
how to log in to the website protected area with a username and password. In the last stage of the
scan wizard, we could check the scan summary with the scan profile and target information. Once we
clicked on finish, the scan was carried out and a complete report was obtained.
The results attained for SQL injection and XSS are shown in Table 6. Analyzing the obtained
results, Joomla! and Drupal present low or very low risk, unlike the outcomes obtained in [
16
]. Testing
SQL injection in the website developed with Joomla!, there were 133 total alerts, and their risk level
was low or 1; whereas testing XSS, we obtained a total of 122 alerts with the same risk level. In contrast,
the website implemented with Drupal presented fewer alerts (78 for SQL injection and 9 for XSS) with
a similar risk level. Therefore, all alerts were low-risk warnings, and were similar in nature. Most
of them corresponded to content, links, or extensions that had been deleted or uninstalled from the
WCMS during the project development and, because of that, the content appears as non-indexed.
In that case, Acunetix recommends removing it manually. On the other hand, tests showed a login
module alert, since the auto-complete option is enabled, and Acunetix recommends disabling it. Lastly,
results for Joomla! indicated that the Jdownloads extension allowed users to upload files, which could
be a dangerous action. However, this was a design requirement for our website.
Table 6. Acunetix alerts.
Joomla! Drupal
SQL injection Total alerts: 133 Total alerts: 78
Risk level: 1 or low Risk level: 1 or low
XSS Total alerts: 122 Total alerts: 9
Risk level: 1 or low Risk level: 0
In addition to the information gathered with the security test, there are other factors that have an
effect on our website security. Both Joomla! and Drupal have a large and active user and developer
community, always ready to include security enhancements into available versions, and also to report
Information 2018,9, 27 12 of 15
errors and potential solutions to solve system deficiencies and vulnerabilities. New versions of Joomla!
and Drupal correct the errors and vulnerabilities of previous versions. However, both WCMS should
give more recommendations to be followed during the installation process, specifically regarding
critical folders and files to protect a posteriori; above all, a special emphasis should be placed on stating
clearly that it is not secure to use the default admin user and the default database prefixes. Instead
of this, the documentation (usually) only recommends deleting installation files after the installation
process. Joomla! and Drupal have third-party additional modules developed to bestow extra security
on websites. One example of such modules is the Taxonomy Access Control, which provides extra
security by employing different user roles. Another example is Marco’s SQL Injection module for
Joomla!, which protects against SQL injection and website file inclusion. Indeed, both WCMS have
directives against SQL injection and XSS attacks. Additionally, they have an internal recognition
system for checking the uploaded files extensions. Similarly, all the implemented structures and APIs
are protected against XSS. Furthermore, third-party components or modules can be set to allow website
visitors to upload files such as contact forms, a download manager, photo galleries, etc., having their
own security configuration measures ranging from using captcha to filtering website visitors by IP
address. These modules always register warnings in the general log, because they are external to
the WCMS and thus may have some incompatibility, system update, or modification as a result of
the version of the module. In addition, these modules and components usually notify the available
updates. It is always recommended to update them, so many problems can be solved (or avoided),
and the performance can be enhanced. Another security measure is spam protection to avoid malicious
users or machines attacking the website using this technique. In particular, Joomla! has a weak point
in the new user registration process, and Drupal recommends the use of captcha in this situation. Lastly,
Drupal alerts should be disabled; otherwise, the security weaknesses will be shown. This is not a
problem in Joomla!, because warning information is not reachable by website users.
6. Conclusions
WCMS provide a flexible way to show content online, being easy to use and manage. Indeed,
nearly 50% of Internet web pages are nowadays implemented using WCMS. Two of the reasons for
this success are that they are intended for a very wide audience, without a need for great computer
skills, and that they offer a large collection of functionalities. In this work, we have shown how to
create three websites with the same graphical design and functionalities using three different WCMS,
namely, Joomla!, Drupal, and WordPress. These WCMS are open-source, can be downloaded from
official websites, and can be installed using a wizard. The only required resources are a database and a
hosting provider. Based on our qualitative study, Joomla! was the most intuitive WCMS, with wider
options for functionalities. Likewise, it had the largest and most active user community. Drupal was
the most complex in terms of management, but seemed more robust in terms of security and users’
roles. Finally, WordPress had the advantage of providing functionalities from its back-end, offered a
free hosting option, was not as complex as Drupal, and was the best in SEO positioning. One initial
requirement for the three websites was having the same visual aspect. To achieve this goal, we used
Artisteer. This software allowed us to create the templates and to obtain the same aesthetic result for
the three websites. In the second part of this work, we addressed security in WCMS. We performed a
basic security analysis on the websites implemented with Joomla! and Drupal. Specifically, we used the
software Acunetix to carry out a gray-box hacking focused on SQL injection and Cross-site scripting
attacks. Before the pentesting, we collected and applied several security measures, e.g., the use of
captcha, IP filtering, events logging, etc. Our findings showed that the tested versions of Joomla! and
Drupal were robust against these attacks. However, new threats will constantly emerge, from phishing
to specific malware targeted to PHP. As a consequence, we believe that WCSM will continue as a
leading-edge research topic in the forthcoming years, with an emphasis on the development of specific
security methods for prevention, detection, and recovery in this type of platform.
Information 2018,9, 27 13 of 15
Acknowledgments:
This research was supported by the AEI/FEDER, UE project grant TEC2016-76465-C2-1-R (AIM).
Author Contributions:
Maria-Dolores Cano conceived and designed the experiments. Antonio Guillen-Perez and
Ramon Sanchez-Iborra contributed with the selection of tools, initial testing, and the state of the art. Antonio-Jose
Aledo-Hernandez performed the experiments. Jose-Manuel Martinez-Caro analyzed the data and. together with
Maria-Dolores Cano, wrote the paper.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Netcraft. Available online: https://www.netcraft.com/ (accessed on 14 December 2017).
2.
World Internet Users Statistics. Available online: http://www.internetworldstats.com/stats.htm (accessed on
14 December 2017).
3.
How Very Small Businesses Are Utilizing the Internet Today and Future Future Expectations; GoDaddy LLC &
Redshift: Scottsdale, AZ, USA, 2015.
4.
Cody, W.F.; Kreulen, J.T.; Krishna, V.; Spangler, W.S. The Integration of Business Intelligence and Knowledge
Management. IBM Syst. J. 2002,41, 697–713. [CrossRef]
5.
Bergstedt, S.; Wiegreffe, S.; Wittmann, J.; Moller, D. Content Management Systems and E-Learning Systems -a
Symbiosis? In Proceedings of the 3rd IEEE International Conference on Advanced Technologies, Athens,
Greece, 9–11 July 2003; pp. 155–159.
6.
McDaniel, R.; Fanfarelli, J.R.; Lindgren, R. Creative Content Management: Importance, Novelty, and Affect
as Design Heuristics for Learning Management Systems. IEEE Trans. Prof. Commun.
2017
,60, 183–200.
[CrossRef]
7.
Wan, S.; Li, D.; Gao, J. Exploring the Advantages of Content Management Systems for Managing Engineering
Knowledge in Product-Service Systems. Procedia CIRP 2016,56, 446–450. [CrossRef]
8.
Bianco, F.; Michelino, F. The Role of Content Management Systems in Publishing Firms. Int. J. Inf. Manag.
2010,30, 117–124. [CrossRef]
9.
Shteiman, B. Why CMS Platforms Are Breeding Security Vulnerabilities. Netw. Secur.
2014
,2014, 7–9.
[CrossRef]
10.
Internet Users and Penetration Worldwide. 2016-2021—Emarketer. Available online: http://www.emarketer.
com/Chart/Internet-Users-Penetration-Worldwide-2016-2021-billions-of-population-change/206259
(accessed on 14 December 2017).
11.
Barker, D. Web Content Management: Systems, Features and Best Practices, 1st ed.; O’Reilly Media: Sebastopol,
CA, USA, 2016, ISBN 9781491908129.
12.
McGraw, G. Software Security: Building Security in; Addison-Wesley: Boston, MA, USA, 2006, ISBN
0321356705.
13.
Hoglund, G.; McGraw, G. Exploiting Software: How to Break Code; Addison-Wesley: Boston, MA, USA, 2004;
ISBN 0201786958.
14.
Symantec. Available online: https://www.symantec.com/security-center/threat-report (accessed on
3 December 2017).
15.
Jonsson, E. Towards an Integrated Conceptual Model of Security and Dependability. In Proceedings of the
First International Conference on Availability, Reliability and Security (ARES’06), Vienna, Austria, 20–22
April 2006.
16.
Meike, M.; Sametinger, J.; Wiesauer, A. Security in Open Source Web Content Management Systems.
IEEE Secur. Priv. Mag. 2009,7, 44–51. [CrossRef]
17.
Aledo-Hernández, A.J.; Guillen-Pérez, A.; Martínez-Caro, J.-M.; Sánchez-Iborra, R.; Cano, M.-D. Sistemas
de Gestión de Contenidos Web: Uso Y Estudio Comparativo de Su Seguridad. In Proceedings of the XIII
Jornadas de Ingeniería Telemática (JITEL 2017), Valencia, Spain, 27–29 September 2017. (In Spanish)
18.
Usage Statistics and Market Share of Content Management Systems for Websites, January 2018. Available
online: https://w3techs.com/technologies/overview/content_management/all (accessed on 8 January 2018).
19.
Historical Yearly Trends in the Usage of Content Management Systems, January 2018. Available online:
https://w3techs.com/technologies/history_overview/content_management/all/y (accessed on 11 January
2018).
Information 2018,9, 27 14 of 15
20.
Patel, S.K.; Rathod, V.; Prajapati, J.B. Performance Analysis of Content Management Systems—Joomla,
Drupal, and WordPress. Int. J. Comput. Appl. 2011,21, 39–43. [CrossRef]
21.
Mirdha, A.; Jain, A.; Shah, K. Comparative Analysis of Open Source Content Management Systems.
In Proceedings of the 2014 IEEE International Conference on Computational Intelligence and Computing
Research, Coimbatore, India, 18–20 December 2014; pp. 1–4.
22. WorPress. Available online: http://www.wordpress.com (accessed on 1 December 2017).
23. Joomla. Available online: http://www.joomla.org (accessed on 1 December 2017).
24. Drupal. Available online: http://www.drupal.org (accessed on 1 December 2017).
25.
W3Techs. Web Technology Surveys. Available online: https://w3techs.com/technologies/overview/
content_management/all (accessed on 1 December 2017).
26.
Patel, S.K.; Rathod, V.R.; Parikh, S. Joomla, Drupal and WordPress—A Statistical Comparison of Open
Source CMS. In Proceedings of the 2011 3rd International Conference on Trendz in Information Sciences and
Computing (TISC), Chennai, India, 8–9 December 2011; pp. 182–187. [CrossRef]
27.
Jerkovic, H.; Vranesic, P.; Dadic, S. Securing Web Content and Services in Open Source Content Management
Systems. In Proceedings of the 2016 39th International Convention on Information and Communication
Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 30 May–3 June 2016; pp. 1402–1407.
28.
Proyecto Webscarab OWASP. Available online: https://www.owasp.org/index.php/Proyecto_WebScarab_
OWASP (accessed on 1 December 2017).
29.
Tamper Data: The Firefox Add-on. Available online: https://www.lifewire.com/firefox-addon-that-hackers-
dont-want-you-to-know-about-2487289 (accessed on 1 December 2017).
30.
Hawkins, B.; Demsky, B. ZenIDS: Introspective Intrusion Detection for PHP Applications. In Proceedings
of the 39th International Conference on Software Engineering, Buenos Aires, Argentina, 20–28 May 2017;
pp. 232–243. [CrossRef]
31.
Vasek, M.; Wadleigh, J.; Moore, T. Hacking Is Not Random: A Case-Control Study of Webserver Compromise
Risk. IEEE Trans. Dependable Secur. Comput. 2015,13, 206–219. [CrossRef]
32.
Shivakumar, S.K. Enterprise Content and Search Management for Building Digital Platforms; John Wiley & Sons:
Hoboken, NJ, USA, 2016, ISBN 1119206812.
33. Artisteer. Available online: http://www.artisteer.com (accessed on 1 December 2017).
34.
Vinaora Nivo Slider—Joomla! Extension. Available online: https://extensions.joomla.org/extension/
vinaora-nivo-slider/ (accessed on 3 December 2017).
35.
Social Media Buttons and Management—LinksAlpha.com. Available online: https://www.linksalpha.com/
(accessed on 3 December 2017).
36.
ITP Social Buttons—Joomla! Extension Directory. Available online: https://extensions.joomla.org/
extension/itpsocial-buttons/ (accessed on 3 December 2017).
37. Google Translate. Available online: https://translate.google.com/ (accessed on 3 December 2017).
38.
jDownloads! Download Manager for Joomla! Available online: http://www.jdownloads.com/ (accessed on
3 December 2017).
39. Mailchimp. Available online: http://www.mailchimp.com (accessed on 1 November 2017).
40.
Newman, R.C. Cybercrime, Identity Theft, and Fraud. In Proceedings of the 3rd Annual Conference on
Information Security Curriculum Development, Kennesaw, Georgia, 22–23 September 2006; ACM Press:
New York, NY, USA, 2006; p. 68.
41.
Tanenbaum, A.S.; van Steen, M. Distributed Systems: Principles and Paradigms; Prentice-Hall: Upper Saddle
River, NJ, USA, 2002.
42. 2016 Vulnerability Statistics Report; EdgescanTM Portal: Dublin, Ireland, 2016.
43. Apache. Available online: https://www.apache.org/ (accessed on 14 December 2017).
44.
Yusof, I.; Pathan, A.-S.K. Mitigating Cross-Site Scripting Attacks with a Content Security Policy. Computer
2016,49, 56–63. [CrossRef]
45.
Cross-Site Scripting (XSS)—OWASP. Available online: https://www.owasp.org/index.php/Cross-site_
Scripting_(XSS) (accessed on 3 December 2017).
46.
CWE—CWE-79: Improper Neutralization of Input During Web Page Generation (’Cross-site Scripting’) (3.0).
Available online: http://cwe.mitre.org/data/definitions/79.html (accessed on 3 December 2017).
47.
SQL Injection—OWASP. Available online: https://www.owasp.org/index.php/SQL_Injection (accessed on
3 December 2017).
Information 2018,9, 27 15 of 15
48.
SQL Injection (SQLi)—Acunetix. Available online: https://www.acunetix.com/websitesecurity/sql-
injection/ (accessed on 3 December 2017).
49. Shar, L.K.; Tan, H.B.K. Defeating SQL Injection. Computer 2013,46, 69–77. [CrossRef]
50.
National Institute of Standars and Technology. Assessing Security and Privacy Controls in Federal
Information Systems and Organizations: Building Effective Assessment Plans. NIST Spec. Publ. 800-53A
2014,4, 1–487. [CrossRef]
51. Acunetix. Available online: https://www.acunetix.com/ (accessed on 3 December 2017).
©
2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license (http://creativecommons.org/licenses/by/4.0/).
... Plugins can add new functions to the base application without affecting its source code. They are commonly used in web browsers, content management systems (CMSs) [22], graphics, hypertext, and code editors [23], and in geographic information systems (GISs) [24]. Web browser plugins can block advertisements, translate texts, play multimedia, or improve user security [25]. ...
Article
Full-text available
Featured Application The AI plugins can support website and web application auditing, facilitating preliminary evaluation of quality attributes, particularly regarding search engine optimisation and accessibility. Abstract Although large language models (LLMs) like the Generative Pre-trained Transformer (GPT) are growing increasingly popular, much remains to learn about their potential for website quality auditing. The article evaluates the performance of LLM AI plugins (GPT models) in website and web application auditing. The author built and tested two original ChatGPT-4o Plus (OpenAI) plugins: Website Quality Auditor (WQA) and WebGIS Quality Auditor (WgisQA). Their performance was cautiously and carefully analysed and compared to traditional auditing tools. The results demonstrated the limitations of the AI plugins, including their propensity for false outcomes. The general conclusion is that using AI tools without considering their characteristics may lead to the propagation of AI hallucinations in audit reports. The study fills in the research gap with the results on the capabilities and limitations of AI plugins in the context of auditing. It also suggests further directions for improvement.
... Hacia 2005, habían aparecido ya numerosos otros sistemas CMS (Mooney, 2008), muchos de los cuales permanecen en uso hasta el día de hoy. Algunos de los más relevantes actualmente en las páginas de la UNAM son Wordpress, Mambo (renombrado a Joomla), y Drupal (Martínez-Caro, et al., 2018), aunque indudablemente hay una gran variedad de sistemas más allá de los aquí mencionados. ...
Article
Full-text available
Se describe el proceso de migración de un sitio web universitario medianamente complejo, esto es, desde la versión 7 de la plataforma Drupal a la plataforma Backdrop. Se asegura así un camino para su mantenimiento en operación, dado que la versión de Drupal en cuestión dejará inminentemente de tener mantenimiento. Se presentan playbooks para ayudar al usuario a tener una transición sencilla.
... A significant contribution has been made by webbased content management systems (WCMS) that help curate datasets and analyze and publish results on the World Wide Web. Nearly 50% of websites on the internet are created using WCMS [1]. WordPress, Joomla, and Drupal are among the popular WCMS that have helped develop hundreds and thousands of websites. ...
Article
Full-text available
Regenerated Identities (RegID) is a web-based content management system for digital humanities (DH) scholars to curate, meta-tag, analyze, visualize, cross-reference, and publish large volumes of historical datasets. This article describes the development methodology of RegID, highlighting the underlying theoretical concepts driven by information studies and the results of participatory research that employs user-centered design and design thinking strategies. Focusing on African studies and slavery research as a case study, the development of RegID demonstrates that a thematic approach and understanding of users' needs and behavior of information interactions is important in developing such digital tools. Scholars' engagement in the design process helps address their unique challenges and workflows, which is unachievable through broad-spectrum content management systems such as WordPress, Jumla, or Wix. The user-centered design facilitated a more intuitive and efficient interface that provides a digital space for collaborative research. RegID is hosting over 20 projects addressing the technological challenges faced by scholars in the field.
... Web content management's major purpose is to provide end users with an abstraction layer that hides the complexities of the technology stack. This allows end users to concentrate on the most important component of the WCMS, which is giving secure access to the web portal's content management [2]. The efforts of researchers and organizations have mostly concentrated on the goal of building and developing Weboriented data access, with one click away comfort, fully created using influential technical combinations such as ASP.net, sql, Django, php, and so on. ...
Chapter
This book series aims to provide a forum for researchers from both academia and industry to share their latest research contributions in the area of computing technologies and Data Sciences and thus to exchange knowledge with the common goal of shaping the future. The best way to create memories is to gather and share ideas, creativity and innovations. It also focuses on a range of issues but not limited.
Chapter
In chapter 10, the basics of the Internet and their impact on multichannel marketing are presented. Building on this, the client–server principle, web development, and the most important internet services are explained in more detail. In addition, the development of the human–machine interface is described and explained using the HMI model of human–machine interaction.
Chapter
Integrating digital marketing and social media is crucial for organizations to navigate the ever-changing global media environment. Amidst polarization, fragmentation, and convergence, marketers can utilize social media's potential to foster connections, increase brand recognition, and involve communities. Attainment requires manoeuvring through the digital environment, adjusting to shifting consumer preferences and imbibing novel ideas. Methods encompass data analytics to obtain valuable insights, develop engaging content experiences, and emphasize genuineness and adaptability. Anticipating forthcoming developments and adopting novel strategies will be essential for optimizing the influence of marketing efforts. In our interconnected world, social media marketing presents various opportunities and challenges that necessitate a strategic, audience-focused, and data-driven approach to achieve success.
Chapter
In the fifth chapter, the basics of the Internet and their impact on the digital business architecture are presented. Building on this, the client-server principle, web development, and the most important internet services are explained in more detail. In addition, the development of the human–machine interface is described and explained using the HMI model of human–machine interaction. Chapter 5 concludes with a description of the success factors of human–machine interaction.
Article
Full-text available
This research aims to deliver valuable insights into PHP-based content management systems (CMS) by assesing the various comparison methods, techniques and assessment studies. This research study illuminates the importance status of a robust CMS in enabling users to seamlessly integrate diverse functionalities into their websites through plugins and widgets. Emphasizing the worth of modular architecture, PHP is utilized for customizing the user interface, while a CMS efficiently manages the website's content. All the popular PHP-based digital tools such as WordPress, Joomla, and Drupal are explored within this context. Real-world case studies and examples are curated to offer practical perspectives on CMS utilization. Despite the plethora of software packages available for CMS, selecting the most suitable one can be challenging due to the disparate nature of trend and evaluation data. Through our findings, we address the advantages and disadvantages associated with WordPress, Joomla, and Drupal. WordPress stands out for its extensive array of plugins, enhancing its user-friendliness and basic functionality. However, Joomla may require additional essential capabilities despite its overall usability. On the other hand, Drupal emerges as a commendable choice for both simple and intermediate websites, boasting straightforward management capabilities. Ultimately, we advocate for business owners to leverage trend data alongside their specific requirements in selecting a CMS that aligns with their web strategy, ensuring continued support and adaptability for future endeavors.
Conference Paper
Full-text available
Los Sistemas de Gestión de Contenido Web (Web Content Management Systems, WCMS) han ganado mucha popularidad debido a la facilidad que aportan a la hora de crear páginas o portales web, sites de comercio electrónico, etc. En este trabajo se explica de forma resumida cómo es el manejo los WCMS y qué se puede lograr con su uso. Para ello, trabajaremos con tres de los más populares WCMS de tipo open-source empleados hoy en día, Joomla, Wordpress y Drupal, y veremos las ventajas e inconvenientes de trabajar con cada uno de ellos. Con este fin, crearemos tres web iguales en requisitos y funcionalidades, una con cada WCMS, y se analizará cualitativamente la complejidad de cada uno de ellos. Finalmente, realizaremos un análisis básico de seguridad de las webs creadas, informando de sus posibles vulnerabilidades, explicando cómo mejorar su seguridad, qué fallos no debemos cometer y qué WCMS es inicialmente más seguro/vulnerable.
Conference Paper
Full-text available
Since its first appearance more than 20 years ago, PHP has steadily increased in popularity, and has become the foundation of the Internet's most popular content management systems (CMS). Of the world's 1 million most visited websites, nearly half use a CMS, and WordPress alone claims 25% market share of all websites. While their easy-to-use templates and components have greatly simplified the work of developing high quality websites, it comes at the cost of software vulnerabilities that are inevitable in such large and rapidly evolving frameworks. Intrusion Detection Systems (IDS) are often used to protect Internet-facing applications, but conventional techniques struggle to keep up with the fast pace of development in today's web applications. Rapid changes to application interfaces increase the workload of maintaining an IDS whitelist, yet the broad attack surface of a web application makes for a similarly verbose blacklist. We developed ZenIDS to dynamically learn the trusted execution paths of an application during a short online training period and report execution anomalies as potential intrusions. We implement ZenIDS as a PHP extension supported by 8 hooks instrumented in the PHP interpreter. Our experiments demonstrate its effectiveness monitoring live web traffic for one year to 3 large PHP applications, detecting malicious requests with a false positive rate of less than .01% after training on fewer than 4,000 requests. ZenIDS excludes the vast majority of deployed PHP code from the whitelist because it is never used for valid requests—yet could potentially be exploited by a remote adversary. We observe 5% performance overhead (or less) for our applications vs. an optimized vanilla LAMP stack.
Conference Paper
Full-text available
Knowledge management has drawn great interest in manufacturing industries and related business practices. With the requirement for better managing the massive data and knowledge generated during different lifecycle stages of products, manufacturing industries are looking for effective way to acquire, store, process and share knowledge from and between different stakeholders, so as to make appropriate decisions and continuously improve business operations. Current (conventional) engineering information systems in manufacturing applications, such as Enterprise Resource Planning, Computerized Maintenance Management and Product Lifecycle Management Systems are difficult to inter-operate and integrate with each other when dealing with growing amount of data and knowledge as a product goes through its lifecycle stages. As informational and communication technologies (ICT) are being developed much faster in other sectors such as financial, business and social media, it is important to explore the potential of latest ICT tools predominantly used in those sectors for engineering applications and identify any advantages and benefits over the conventional engineering information systems. This paper presents an experiment in using an Open Source Content Management System, for the implementation of a collaborative product-service system for the planning and execution of maintenance and service operations of high-value complex numerical control machine tools in advanced manufacturing systems.
Conference Paper
Full-text available
There are many web-authoring software like FrontPage, Dreamweaver, etc which have been used to develop and maintain the websites. But gradually, it became difficult to maintain and update the websites because of their very dynamic nature and a variety of file formats. Content Management Systems(CMS) evolved as an alternative to such web-authoring tools. A content management system offers a way to manage large amounts of web-based information that escapes the burden of coding all of the information into each page in HTML by hand. Although the rapid proliferation of commercially available content management systems makes it easier to find a vendor that might have right solution, the cost to purchase a commercial CMS application is very high. As an alternative to commercial CMS, open source solutions are a tantalizing option. Though, there are a huge number of open source CMS available in public domain, it is difficult to decide what solution will work best for a particular organization (or library). The author explain on this paper the functional requirements, for novice users, of a CMS and to evaluate a few most popular open source CMSs.
Book
Provides modern enterprises with the tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques. Contemporary business organizations can either embrace the digital revolution-or be left behind. Enterprise Content and Search Management for Building Digital Platforms provides modern enterprises with the necessary tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques to compete in the today's digital world. Features include comprehensive discussions on content strategy, content key performance indicators (KPIs), mobile-first strategy, content assessment models, various practical techniques and methodologies successfully used in real-world digital programs, relevant case studies, and more. Initial chapters cover core concepts of a content management system (CMS), including content strategy; CMS architecture, templates, and workflow; reference architectures, information architecture, taxonomy, and content metadata. Advanced CMS topics are then covered, with chapters on integration, content standards, digital asset management (DAM), document management, and content migration, evaluation, validation, maintenance, analytics, SEO, security, infrastructure, and performance. The basics of enterprise search technologies are explored next, and address enterprise search architecture, advanced search, operations, and governance. Final chapters then focus on enterprise program management and feature coverage of various concepts of digital program management and best practices-along with an illuminating end-to-end digital program case study. Offers a comprehensive guide to the understanding and learning of new methodologies, techniques, and models for the creation of an end-to-end digital system. Addresses a wide variety of proven best practices and deployed techniques in content management and enterprise search space which can be readily used for digital programs. Covers the latest digital trends such as mobile-first strategy, responsive design, adaptive content design, micro services architecture, semantic search and such and also utilizes sample reference architecture for implementing solutions. Features numerous case studies to enhance comprehension, including a complete end-to-end digital program case study. Provides readily usable content management checklists and templates for defining content strategy, CMS evaluation, search evaluation and DAM evaluation. Comprehensive and cutting-edge, Enterprise Content and Search Management for Building Digital Platforms is an invaluable reference resource for creating an optimal enterprise digital eco-system to meet the challenges of today's hyper-connected world.
Article
Background: This paper examines creativity in content management (CM) by presenting a case study analysis of an original, open-source, web-based learning-management system (LMS). It explores existing literature and suggests new ideas about creativity and CM. Research questions: How can we conceptualize creativity in relation to CM? How can creativity be operationalized into specific design practices within CM? What dimensions of creativity should be considered when designing or evaluating creative CM systems? Situating the case: Theoretical research in content-management systems (CMSs) and LMSs has revealed a gap in our field's current understanding of how creativity relates to CM. Research studies related to the measurement of creativity have provided insight into characteristics and methodologies that could be adopted and adapted to evaluate creativity in CM. Studies from the learning sciences have investigated where LMSs fall short and suggested where new opportunities exist to better facilitate the informational needs of users. These works have pointed to a need for research on integrating creativity and CM, both in content and in the systems that manage content, and have laid the groundwork for this study. Methodology: This research investigates theories of creativity as they relate to CM by conducting a case study analysis of unique instructional software designed to deliver content to students enrolled in a university course. The primary evidence is taken from notes about the design and evaluation of the software and from survey data illustrating students’ user experiences. About the case: We developed a classification strategy for exploring creativity along three dimensions—importance, novelty, and affect—and then used this strategy to explore a unique system's approach to deal with content challenges in each of those areas. User experience impressions provide evidence of successes and failures of experimental CM in these domains. Conclusions: The study finds that this original LMS design did contain features that exhibited novelty, importance, and affect, and that such features can be used to identify creativity in product design as well as to assess the design of complex software systems such as CMSs and LMSs. This detailed analysis of an original design for an LMS suggests new ideas for implementing and using CMSs and LMSs in technical communication. The study concludes by presenting a rubric for evaluating creativity in CMSs and LMSs, or for designing such systems with creativity in mind.
Article
A content security policy (CSP) can help Web application developers and server administrators better control website content and avoid vulnerabilities to cross-site scripting (XSS). In experiments with a prototype website, the authors' CSP implementation successfully mitigated all XSS attack types in four popular browsers.
Article
In the past decade, the effect of internet usage on businesses, has increased rapidly, and new technlogies have increased business productivity by many folds. By using a content management systems (CMSs), small scale businesses with restrained budgets need not to be concerned about hiring professional programmers to put their businesses online through a website. A CMS is a software that keeps track of every piece of content on a website, without requiring any technical skills or knowledge of management. This paper compares seven CMSs, namely Alfresco, Typo3, Dotnetnuke, Drupal, Joomla, Wordpress and Plone on the dimensions namely, system requirements, performance, security, built-in features, support and management. We have chosen these seven CMSs based on their e-commerce market share, google page rank, brand strength and rate of adoption.
Article
We describe a case-control study to identify risk factors that are associated with higher rates of webserver compromise. We inspect a random sample of around 200 000 webservers and automatically identify attributes hypothesized to affect the susceptibility to compromise, notably content management system (CMS) and webserver type. We then cross-list this information with data on webservers hacked to serve phishing pages or redirect to unlicensed online pharmacies. We find that webservers running WordPress and Joomla are more likely to be hacked than those not running any CMS, and that servers running Apache and Nginx are more likely to be hacked than those running Microsoft IIS. We also identify several WordPress plugins and Joomla extensions that associated with compromise. Furthermore, using a series of logistic regressions, we find that a CMS’s market share is positively correlated with website compromise. Surprisingly, we find that webservers running outdated software are less likely to be compromised than those running up-to date software. We present evidence that this is true for core WordPress software (the most popular CMS platform) and many associated plugins. Finally, we examine what happens to webservers following compromise. We find that under 5% of hacked WordPress websites are subsequently updated, but those that do are recompromised about half as often as those that do not update.