PDA

View Full Version : Exposing the user to harm


hambil
07-01-2007, 04:07 AM
I don't know, maybe this gets deleted. I think it's valuable site feedback. When a security vulnerability is found in software, there is a specific sequence of events every commercial and open source site I've ever work with, or for, follows.

1) Fix it.
2) Post the patch.
3) Inform the users about the availability of the patch.

This is done to protect the users. Any other sequence puts the users at great risk of harm because it announces a security vulnerability before a fix is available. It actually alerts the people who might wish to do harm that a vulnerability exists and has not been patched.

Further, you don't give out specifics, such as saying it's an HTML injection issue, until after the patch has been made available. Once again, to keep that information from the hands of those that would do harm.

The policy here is backwards, and potentially damaging.

nexialys
07-01-2007, 04:09 AM
/me gives a hug to hambil !!!

Michael Biddle
07-01-2007, 04:15 AM
/me laughs at all of the stuff going on lately

FreshFroot
07-01-2007, 04:21 AM
I agree, and it sounds good. Needs to go through with the plan!!

deezelpope
07-01-2007, 09:38 AM
*deezelpope gives hugs to all you guys...cuz she luvs you and cuz she can.

Dream
07-01-2007, 09:56 AM
/me needs a hug too

deezelpope
07-01-2007, 09:59 AM
*deezelpope giggles and hugs Dream...and asks, anyone else?:D

Michael Biddle
07-01-2007, 09:59 AM
/me wants to know if you want one from me.

/me looks at the clock and realizes its way past my bed time. Night all

deezelpope
07-01-2007, 10:02 AM
*deezelpope says, sure, why not, she's a very loving person.:) Nighty night, Mike.:D

Dismounted
07-01-2007, 10:26 AM
The problem is though, unlike the developers you talk about, coders here may have a lack of action.

Chris M
07-01-2007, 11:53 AM
Alright guys, can we keep to the topic please :)

Chris

Paul M
07-01-2007, 12:51 PM
There is a big difference between commercial sites and here - your proposal relies on the author actually fixing it - experience shows that this is rarely the case for free modifications released here (take vbplaza, that's still not fixed, months after the holes were found and notified to the author).

We have to have a policy that suits the majority of cases here, and the one we currently have serves that purpose - and while it may not have been ideal for your case, your's is, I'm afraid, an exception, not the rule - the last few have either not been fixed, taken a while to get fixed, or in a couple of cases a staff member has eventually fixed them.

However, we will review what we do to see if it can be tweaked to suit cases where the author is known to be still active.

Of course, it won't make any difference to you since you decided to take all your mods away anyway.

hambil
07-01-2007, 02:03 PM
Of course, it won't make any difference to you since you decided to take all your mods away anyway.
If fairness, if I'm not allowed to say why I did the above, you should not be allowed to use it against me.

There is a big difference between commercial sites and here - your proposal relies on the author actually fixing it - experience shows that this is rarely the case for free modifications released here (take vbplaza, that's still not fixed, months after the holes were found and notified to the author).
This is, perhaps, the crux of the current misunderstanding. I remember vbShout going unfixed forever, until Brad had to fix it. I remember other hacks that had similar issues. That is why I know what the policy used to be - notify the author asking them to change it, and only if they were unresponsive for a fair amount of time would the mod be disabled or, fixed by staff if a staff member was willing.

For such a dramatic change in policy to take place, and for an active hack author to not even know about it, is a serious flaw in the conduct of business - regardless of what you say about the rules being posted.

How about a show of 'virtual hands' for coders who had no idea a policy change had been implemented? I'm sure I'm not alone.

That aside, I still think it's a flawed policy. The email that went out to all the users stated:
This modification contains a MySQL injection vulnerability

It was also put into the thread itself in nice large red letters:
This modification contains a MySQL injection vulnerability

This puts every user of the hack at risk. It also creates a nice little searchable database for anyone who might want to start hacking VB sites. It's an all around bad idea.

smacklan
07-01-2007, 06:19 PM
This puts every user of the hack at risk. It also creates a nice little searchable database for anyone who might want to start hacking VB sites. It's an all around bad idea.
Which is a good reason not to use third party hacks, imho. Learn to code, take care of your own board is what I say. Whilst I appreciate the willingness to share, I think there are too many strings attached that I'm not willing to "be strung up by" for lack of a better description. I also think there are waayyy too many over-inflated ego's on this site (nothing personal towards anyone) and it really does look petty to most.

/speech :)

hambil
07-01-2007, 06:34 PM
Which is a good reason not to use third party hacks, imho.
The official vBulletin Modification site is a strange place to be hanging out, then.

Dream
07-01-2007, 06:38 PM
He or she is here for the styles I think, from her signature.

/me has an inflated ego

Logikos
07-01-2007, 06:49 PM
At vBhackers, we have a system in place that staff use. If a hack has either been a complete rip of someone elses work (usually stolen from here) or contains a security vulnerability, then staff simply put the hack into a "investigation mode". This then places the thread in a moderation queue, a pm is sent to the author and a new thread is created in the staff section to inform other staff members, this is all automatic.

Maybe the vb.org staff can come up with a similar system to handle these problems.

hambil
07-01-2007, 07:29 PM
He or she is here for the styles I think, from her signature.
With the amount of changes many of these skins make, I see little difference. In fact, I've had more bugs introduced from skins than mods. But, too each their own :)

smacklan
07-01-2007, 08:12 PM
The official vBulletin Modification site is a strange place to be hanging out, then.
I'm here for many reasons that have nothing to do with mods...as are many others ;)

I've had more bugs introduced from skins than mods.
Have you ever heard of a security hole being introduced from a skin?

EnIgMa1234
07-01-2007, 08:54 PM
The policy has two sides

If a security hole is found, it is up to users to uninstall the hack. It is also a good idea to not let it be downloaded and for a warning to be put up.

But then letting the author know before hand is also good. If they're not active, take it down

Thats just my opinion

nexialys
07-01-2007, 08:58 PM
I'm here for many reasons that have nothing to do with mods...as are many others ;)
Have you ever heard of a security hole being introduced from a skin?

Hum,...psst... HTML inserts and javascripts exploits are induced by skins... can you just be neutral when you don't know...

anyway, these discussions are completely worthless... if you are not happy with an administration, create your own and start your project... you'll be the one to deal with your problems...

Brad
07-01-2007, 09:36 PM
Have you ever heard of a security hole being introduced from a skin?
While it'll probably never happen...a style release could contain some very nasty stuff if not for a small portion of php code in adminfunctions_template.php.

smacklan
07-01-2007, 09:39 PM
Hum,...psst... HTML inserts and javascripts exploits are induced by skins... can you just be neutral when you don't know...
I didn't say it was impossible, I said have you ever heard of it happening? Please check your over-inflated ego at the door :rolleyes:

Dream
07-01-2007, 10:01 PM
anyway, these discussions are completely worthless...

I agree. Not every coder in this site for hobbyists will want or have time to fix their mods, so the policy of removing them. Asking to be treated differently is an ego problem.

Brandon Sheley
07-01-2007, 10:07 PM
That aside, I still think it's a flawed policy. The email that went out to all the users stated:
This modification contains a MySQL injection vulnerability

It was also put into the thread itself in nice large red letters:
This modification contains a MySQL injection vulnerability

This puts every user of the hack at risk. It also creates a nice little searchable database for anyone who might want to start hacking VB sites. It's an all around bad idea.

I think this is a great idea, this give the users who have installed the hack, ample time to remove the hack from their site.

If you don't keep up with the hacks on your site, that's your problem ;)

just my 2cents :D

hambil
07-01-2007, 10:47 PM
I agree. Not every coder in this site for hobbyists will want or have time to fix their mods, so the policy of removing them. Asking to be treated differently is an ego problem.
I'm not asking to be treated differently. I'm stating that 1) Even if you accept that instantaneously removing a mod is a good thing, broadcasting specifics about the security flaw to the world before it is fixed, is not smart. 2) When a board policy undergoes a significant change, a process should be in place to make sure those affected are aware.

nexialys
07-01-2007, 11:04 PM
Please check your over-inflated ego at the door :rolleyes:

Hey, i paid for that ego, please give it a shot !!!

hambil
07-01-2007, 11:15 PM
I didn't say it was impossible, I said have you ever heard of it happening? Please check your over-inflated ego at the door :rolleyes:
Have you heard of a board being hacked because of a security flaw in a mod? I've been doing this for years and I haven't. The few hackings that I am aware of where over flaws in vb itself.

The biggest problem facing board owners using third party software is bugs, not security flaws. And skins can, and do, introduce plenty of bugs.

smacklan
07-02-2007, 12:06 AM
This thread is about security holes. I do agree with your position about how notification takes place, however.

bashy
07-03-2007, 07:44 AM
That aside, I still think it's a flawed policy. The email that went out to all the users stated:
This modification contains a MySQL injection vulnerability

The email is a good idea to all installers of the hack...I certainly would prefer to receive an email to let me know!


It was also put into the thread itself in nice large red letters:
This modification contains a MySQL injection vulnerability

This puts every user of the hack at risk. It also creates a nice little searchable database for anyone who might want to start hacking VB sites. It's an all around bad idea.

I agree totally, but, then again, it shouldn't be an issue if the installers of the hack
disabled it, if they haven't, then its their own fault, they have been warned, Twice...

hambil
07-03-2007, 10:07 AM
The email is a good idea to all installers of the hack...I certainly would prefer to receive an email to let me know!



I agree totally, but, then again, it shouldn't be an issue if the installers of the hack
disabled it, if they haven't, then its their own fault, they have been warned, Twice...
As you are aware, it only sends an email to people who have marked install. And the thread update will only reach people who have subscribed to the thread (actually not, even that, because I never got a subscription notice when the thread was updated and moved).

We are all very much aware that the installed number only represents a portion of the actual installs.

In a recent vbBux thread, the problem is referred too as a 'security exploit' which is a better way to go.

Paul M
07-03-2007, 12:00 PM
How it should be worded is always debatable, everyone has their own views.

I believe users should be told whether it's XSS or MySQL or whatever - without further details you cannot exploit it anyway.

nexialys
07-03-2007, 12:52 PM
with any detail like "sql inject" or "xss exploit", you can exploit any hack because they are not encoded... with a hack with a single sql query, it is easy to learn how the inject can be done...

if instead you contact the coder, that coder make the change in a reasonable delay, and then update his script without noting the exploit, it would be infinate the risk of a hacker trying to reproduce the exploit and profit from it...

and btw,as anybody can suggest changes to a hack to the coder, why not providing a fix yourself as you already know the exploit, so the coder simply have to update its release... this is a community of sharing after all...

hambil
07-03-2007, 12:56 PM
I'd also recommend that as new exploits are discovered, they are given examples, along with the fix, in the private coders forum - probably in a sticky, indexed thread. This way coders can keep up on their old hacks, and avoid possible problems with their new ones.