![]() |
|
Mod Options |
#61
|
||||
|
||||
disabled here now *bugger* Iliked this mod
__________________
late nites and too much coffee :tired: No members have liked this post.
|
#62
|
|||
|
|||
Yes. But I'd still advise you to wait for staff to fix the bug or something.
No members have liked this post.
|
#63
|
|||
|
|||
Oh er....just noticed CMX's last activity time
"Last Activity: 14. Jul 2006 01:10" Maybe time to move onto another store program, if there is one? No members have liked this post.
|
#64
|
|||
|
|||
nope
No members have liked this post.
|
#65
|
||||
|
||||
Nothing worth the effort...besides most hacks that tie into VBPlaza would also have a bunch of dead code in them.....*sigh*
No members have liked this post.
|
#66
|
||||
|
||||
Thanks to the vbulletin team for keeping us safe and up to date. It's very much appreciated.
This hack was a huge, huge part of our site so I sincerely hope it won't be abandoned ![]()
__________________
MilitarySOS.com - November 2007 Board of the Month TheWomanHood.com - vote us for May's Board of the Month No members have liked this post.
|
#67
|
||||
|
||||
Based on my understanding of the code, (and please note i can be wrong) i reckon that anything that sends out pm's with user input data will create a problem. The issue is that a user can for example in donation enter a custom message that is sent in the pm after passing through the php strip_tags function. Now that function can be exploited . You can do your own research on google.
Please note that i am venturing a guess here and not saying anything with surety. If this is indeed the reason a replacement with htmlentities might do the trick. (or with vb's own function) EDIT: Ok i have reproduced the problem on my test site so please note that this is a sure bug. No members have liked this post.
Last edited by Acers; 06 Feb 2007 at 14:02. |
#68
|
|||
|
|||
As many awesome coders we have on this board and somebody can't replicate another store/points hack?
![]() No members have liked this post.
|
#69
|
|||
|
|||
Acres, with your knowledge of the problem, is their a fix? If so, how does one get the fix approved and implemented in to the already existing code, posted on the board for users to add to their code? Just hoping this fabulous MOD can be saved.
No members have liked this post.
|
#70
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]()
here is a temporary fix, i have tested this locally only for the donate function and its working as far as this exploit goes, and since the same logic can be taken for other places where its used we can replace there
go to your vbplaza folder, find occurrences of the following: includes/function_vbplaza.php find around line 152(depending on the version you have)
make that
go to vbplaza/action.admindonate.php (line 133)
make that
goto vbplaza/action.changeotherusertitle.php (line 136)
make that
goto vbplaza/action.changeusertitle.php (line 87)
make that
goto vbplaza/action.donate.php (line 164)
make that
goto vbplaza/action.gift.php (line 209)
make that
goto vbplaza/action.ribbons.php (line 218)
make that
the above fixes one part of the exploit. Ofcourse there might be other issues involved also, i am still looking around and maybe others are also. Please note that there might be other code areas that can be exploited also which i don't know yet. Don't think you are safe just by doing the above. The full exploit and what caused it has not been released so all this is guesswork to find the vulnerable part.(btw if this was not one part of exploit, even then it should be in part of the fix as the original code above can be exploited.I just looked at the code and saw this cos the original poster had mentioned something to do with pm text. Wait for an official fix or atleast don't blame me ![]() No members have liked this post.
Last edited by Acers; 06 Feb 2007 at 14:42. |
#71
|
||||
|
||||
ACERS you rock!
Is vb.org attempting a patch? No members have liked this post.
|
#72
|
|||
|
|||
Originally Posted by Artificial_Alex
Tell me how it's being exploited and then I can release a fix for it.![]()
I mean, I'm the creator of the addon. (PM me the details.) -CMX
__________________
http://www.cmgsccc.com/ No members have liked this post.
|
#73
|
||||
|
||||
![]()
Originally Posted by CMX_CMGSCCC
Awesome!! ![]()
![]() ![]()
__________________
MilitarySOS.com - November 2007 Board of the Month TheWomanHood.com - vote us for May's Board of the Month No members have liked this post.
|
#74
|
|||
|
|||
Originally Posted by CMX_CMGSCCC
You might want to PM the vbulletin.org admin if you have not been in contact already as I believe there are other exploits found other than this one or other coders may want to post about other exploits.![]()
Sorry to hear about your board but nice find Artificial Alex, especially with other exploits found. Just deleting the code for or turning off Donation or even using a coding fix for this one main exploit might not be all that is needed. A great add on for a forum and exploits are fixable, patience is a virtue. ![]() No members have liked this post.
Last edited by Universal; 06 Feb 2007 at 16:22. |
#75
|
|||
|
|||
Originally Posted by CMX_CMGSCCC
Oh man where have you been? We are dying for the new version of this and well, we missed you too. ![]()
![]() No members have liked this post.
|
![]() |
«
Previous Mod
|
Next Mod
»
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Mod Options | |
|
|
New To Site? | Need Help? |
All times are GMT. The time now is 05:21.