![]() |
|
Thread Tools |
#1
|
|||
|
|||
Recent hacks - exploit discussion
http://www.reddit.com/r/netsec/comme...n_compromises/
I have the exploit code, researching it, also confirmed it works. On black market, exploit is worth $7000. Most of the times, it ends up with C99/PHPShell installed (mostly under Admin CP -> Paid Subscriptions -> Subscriptions Manager - because part of the users never look there.) Have you secured your vBulletins/were you hacked? How vBulletin plans to fix it?
__________________
Developing quality products for vBulletin. Server-related work, vB installing/upgrading/maintenance/moving between hosts, after hack cleanups + securing the server. I also offer penetration (security) tests for your VPS/dedicated servers. Skype: create365 No members have liked this post.
Last edited by create365; 18 Nov 2013 at 17:28. |
#2
|
||||
|
||||
So, you still have to some how gain access to a semi-privileged account, and then get an administrator to look at the post that has the malicious html in it?
__________________
Looking for ImpEx?
No members have liked this post.
|
#3
|
|||
|
|||
Nope. Attack can be done from any site, but administrator has to view it. No account on target forums needed. It's pretty easy to achieve.
If someone with less privileges enters the page, it does other stuff. As described above its multi-stage. The site when viewing opens an invisible iframe and executes the exploit. Then, if it manages to install the shell, entering specific url enables hacker to access server almost like via ssh. It allows to execute SQL queries, for example to add new administrator, or even truncate all tables.
__________________
Developing quality products for vBulletin. Server-related work, vB installing/upgrading/maintenance/moving between hosts, after hack cleanups + securing the server. I also offer penetration (security) tests for your VPS/dedicated servers. Skype: create365 No members have liked this post.
Last edited by create365; 18 Nov 2013 at 17:38. |
#4
|
||||
|
||||
Still requires sending someone semi-privileged to view the malicious code, and that the user has access to do the things outlined.
I'd like to point out, you can restrict access to other admins changing other admins account via the config.php file, as well as locking down admin permisions via a super admin.
__________________
Looking for ImpEx?
No members have liked this post.
|
#5
|
||||
|
||||
No members have liked this post.
|
#6
|
|||
|
|||
Well, that is the easiest part.
__________________
Developing quality products for vBulletin. Server-related work, vB installing/upgrading/maintenance/moving between hosts, after hack cleanups + securing the server. I also offer penetration (security) tests for your VPS/dedicated servers. Skype: create365 No members have liked this post.
|
#7
|
||||
|
||||
I've ran into this before even was worried about it back in September remember that pm I sent you Zachery? It was related to this the exploit I thought was out there but could not confirm.
What they are doing is base64 encoding the plugins so hard to tell what exactly it's doing... it's always 3-4 plugins and 3/4 prompt virus alerts from your software (which c99 madshell does so if the shell script was not on the local server then zing you guessed it, they connected to it remotely via the plugin i.e. the anti-virus alert). Basically instead of now uploading c99madshell directly onto the server they are trying to exploit, they simply modified it and uploaded to their own server - after that the plugin connects to c99 madshell and they execute what they wish from their own server through your site via the plugins yet one more reason you don't see all what you wish you did in the logs while trying to figure out what just smacked you silly.
__________________
Daddy Does Dios and Figs! https://www.linkedin.com/in/thelastsuperman Search - Use the search feature to find similar issues/answers. Information - Include screenshots, copy/pasted error codes, url etc. Fixed - Please return to your thread/post and let us know how it was fixed! Thanks - For participating! Click the "Like" ♥ on a post if someone helped you! No members have liked this post.
Last edited by TheLastSuperman; 18 Nov 2013 at 19:40. |
#8
|
||||
|
||||
So your admins should generally be undeletable/unalterable. It's a pain, but it helps.
$7000!? Seems like all of this could have been avoided if you just used secure passwords.
__________________
No members have liked this post.
|
#9
|
||||
|
||||
This page says the exploit uses HTML in Announcement Titles... Isn't that exactly what happened here on vBulletin.org?
No members have liked this post.
|
#10
|
||||
|
||||
I don't see how, if the dev server attack was non-vBulletin related.
__________________
No members have liked this post.
|
#11
|
||||
|
||||
Originally Posted by Digital Jedi
Check out Post #22 by Paul M here:![]()
http://www.vbulletin.org/forum/showt...=304654&page=2 Maybe I'm putting two and two together incorrectly here, but it seems like these are definitely the same. No members have liked this post.
|
#12
|
||||
|
||||
Originally Posted by findingpeace
As much as I've been on here the last couple of days, I've completely missed that event. I thought you were referring to the attack on the server. I guess test accounts were overlooked during the password change.
![]()
__________________
No members have liked this post.
|
#13
|
|||
|
|||
what about this post --
http://www.vbulletin.com/forum/forum...s-in-vbulletin so we shouldn't be nervous? No members have liked this post.
|
#14
|
|||
|
|||
Make sure you have proper backups and have handled all recommendations. Then go on and enjoy your life.
![]() Last edited by tbworld; 18 Nov 2013 at 21:52. |
![]() |
«
Previous Thread
|
Next Thread
»
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Thread Tools | |
|
|
New To Site? | Need Help? |
All times are GMT. The time now is 22:52.