vb.org Archive

vb.org Archive (https://vborg.vbsupport.ru/index.php)
-   vBulletin 4.x Add-ons (https://vborg.vbsupport.ru/forumdisplay.php?f=245)
-   -   Miscellaneous Hacks - Rotating Banner System (https://vborg.vbsupport.ru/showthread.php?t=188328)

y2ksw 03-04-2016 05:52 AM

Quote:

Originally Posted by zackw (Post 2566458)
It seem this script may have been hacked.

Maybe it's not this script, but something else? In any case, there is a script injected into my template in the code where RBS is supposed to be. This screenshot shows a bad script in my template where it was never supposed to be. I deleted RBS and all its files.

To anybody else with RBS, please check the template location, and also check page source for the phrase "lovehouse" to confirm. Maybe it was just me, or maybe the hack was injected through some other means, I just don't know.

http://www.mediafire.com/view/jv5ekliv2ibkocj/hack.png

It isn't!

Your templates are your templates and all what happens to them is entirely up to you. This modification does not make any changes to existing templates and template modifications as suggested in the help file, are made by you or your software.

y2ksw 03-04-2016 05:55 AM

Quote:

Originally Posted by Greta@CPF (Post 2564652)
Ok - this has to be done for each individual banner in the Position 2 pool. There is no way to do this through "Manage Ads" under the Advertising tab in vBulleitn?

Yes, you can eventually do it from there, if there is such as a negation option.

zackw 03-04-2016 02:21 PM

Quote:

Originally Posted by y2ksw (Post 2566498)
It isn't!

Your templates are your templates and all what happens to them is entirely up to you. This modification does not make any changes to existing templates and template modifications as suggested in the help file, are made by you or your software.

I didn't make the changes. That's why it's called a hack. But seemed to be connected with this script if that's how the hacker gained entrance.

When I run the suspect file version tool, the ONLY files that it complains about are RBS files.

y2ksw 03-04-2016 04:45 PM

Quote:

Originally Posted by zackw (Post 2566524)
I didn't make the changes. That's why it's called a hack. But seemed to be connected with this script if that's how the hacker gained entrance.

When I run the suspect file version tool, the ONLY files that it complains about are RBS files.

Yeah I'm sure you didn't change in the way it is now, but I'm sure you created the part which follows the "hack". Because this script dows not make changes to the templates. Else, you could also say it is related to vBulletin or any other script you may have.

The WORM you got in your forums is changing whatever it pleases, it has nothing to do with any other legit script. Remove it (and the changes it made) and your forum behaves well.

zackw 03-04-2016 04:55 PM

Quote:

Originally Posted by y2ksw (Post 2566531)
Yeah I'm sure you didn't change in the way it is now, but I'm sure you created the part which follows the "hack". Because this script dows not make changes to the templates. Else, you could also say it is related to vBulletin or any other script you may have.

The WORM you got in your forums is changing whatever it pleases, it has nothing to do with any other legit script. Remove it (and the changes it made) and your forum behaves well.

"Remove it..." How does one find "it"? VB file checker only shows RBS files as suspicious. Should I delete them? Reinstall RBS?

I realize RBS doesn't change templates. And you know, html forms don't delete databases, but people have used insecure forms to do just that with SQL injection.
I doesn't matter what RBS "does" in normal operation, the question is whether things were hacked through it.

In any event, I edited the templates to remove the payload, but what other means can tell me where some worm is hiding?

I know this is probably not the thread to continue this, but if someone has a link to a method of validating the whole install, that would help.

squidsk 03-04-2016 07:57 PM

You have to trace the changes. Find out when and who changed the template from the logs and go from there. It's a painstakingly slow process to find when and who changed it. As for vbulletin reporting rbs files as suspect it will do that for almost all products since most product do not supply the xml file that vb requires to know if the file is the original file for the mod.

y2ksw 03-05-2016 04:06 AM

Quote:

Originally Posted by zackw (Post 2566532)
"Remove it..." How does one find "it"? VB file checker only shows RBS files as suspicious. Should I delete them? Reinstall RBS?

I realize RBS doesn't change templates. And you know, html forms don't delete databases, but people have used insecure forms to do just that with SQL injection.
I doesn't matter what RBS "does" in normal operation, the question is whether things were hacked through it.

In any event, I edited the templates to remove the payload, but what other means can tell me where some worm is hiding?

I know this is probably not the thread to continue this, but if someone has a link to a method of validating the whole install, that would help.

This particular WORM enters via XSS your admin panel and installs itself into the plugin cache. Some versions keep also a plugin you never installed, but most of them just have the cached code, which may be found by extracting all plugin code from the datastore table. It has a suspiciously long white space line (to move out of sight) and some eval/base64_decode sequences which install and quirk the templates in order to show their links.

You can get rid of the cache-only version by saving a single plugin, but usually there is also an infected script (tampered image) which then reinstalls the WORM once again. I found that Avast makes a good job to find infected scripts, but also a global search on files for some pattern may work as well.

Please note, that this WORM is carefully designed and not as stupid as most of their kind. It is hard to remove and usually requires to check all files on your installation, including plugins where it may hide (appended or prepended, rarely inserted). There also may be some templates which attempt to load external files in order to reinfect the whole.

cloferba 03-09-2016 07:48 PM

Hi!

Thank you so much for your plugin.

Could you please let me know if PHP code can be inserted?
Quote:

Text
This field may hold any kind of script (e.g. Google AdSense) and/or HTML which will be inserted in your pages. Please make sure it works and that all tags are closed properly.
Thank you

y2ksw 03-10-2016 04:24 AM

Quote:

Originally Posted by cloferba (Post 2566895)
Hi!

Thank you so much for your plugin.

Could you please let me know if PHP code can be inserted?


Thank you

No. PHP isn't executed at the browser level.

Scream And Fly 03-27-2016 06:03 AM

Hello! I've been using your product for years at www.screamandfly.com
On the left side, we have four 140x200px banners managed by the individual locations, which is great.
I wanted to add additional banners, however when I add another banner to a 5th location, it won't show up. It seems only the 4 locations can be visible. Is there an easy way to add more locations on the left side?

Thank you!


All times are GMT. The time now is 03:50 AM.

Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.

X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.04201 seconds
  • Memory Usage 1,756KB
  • Queries Executed 10 (?)
More Information
Template Usage:
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (8)bbcode_quote_printable
  • (1)footer
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (6)option
  • (1)pagenav
  • (1)pagenav_curpage
  • (4)pagenav_pagelink
  • (4)pagenav_pagelinkrel
  • (1)post_thanks_navbar_search
  • (1)printthread
  • (10)printthreadbit
  • (1)spacer_close
  • (1)spacer_open 

Phrase Groups Available:
  • global
  • postbit
  • showthread
Included Files:
  • ./printthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/class_bbcode_alt.php
  • ./includes/class_bbcode.php
  • ./includes/functions_bigthree.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • printthread_start
  • pagenav_page
  • pagenav_complete
  • bbcode_fetch_tags
  • bbcode_create
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • printthread_post
  • printthread_complete