![]() |
I'd like to know if this is working or how to make it work with 4.2.1 as well.
As Wolver2 said above, it's very important to many of us. Or is there another product that's compatible with 4.2.1?? |
I think its working as I get the emails for 4.2.1 and I get "Infects found: {1}"
BUT I CANNOT SEE WHERE! the emails are all blank lol |
Hmm... after 15 months of using this addon I'm now getting blank emails at 2, 22 and 42 minutes of every hour (which is when the job is scheduled to run).
Haven't installed anything lately so I'm guessing there was/is some sort of infection, however the files are blank. There are no infected addons according to the emails I'm getting, including the first. Any idea? |
Running 4.2.0pl2 and get this response running the cron job regardless of whether demo is active/enabled or not:
The following modules were infected: pluginlist Read through this whole thread, didn't find anything to tell me whether I have a problem or not. Any help? |
Makes me wonder why this isn't built in functionality. :/
|
Quote:
|
1 Attachment(s)
As this has never been updated I have fixed the English version as some of it was not in English and also the grammar was not the best. This is all that I have done
|
I have a question, and can offer some help/advice.
:D I installed this on a known compromised site. I was getting blank emails every 20 minutes. Scheduled Task Log Viewer indicates what a lot of folks prevoiusly posted here on when asking about 'pluginlist' 9957 Check 4 Hacking 12:14, 19th Sep 2013 Infects found: pluginlist 9956 Check 4 Hacking 11:42, 19th Sep 2013 Infects found: pluginlist 9955 Check 4 Hacking 11:22, 19th Sep 2013 Infects found: pluginlist (over and over) I went into phpMyAdmin and ran this query: Code:
SELECT title FROM datastore WHERE data LIKE '%base64%' resultant row: pluginlist Code:
SELECT * FROM `datastore` WHERE `title` = 'pluginlist'; edited that record, found: Code:
.... Dug some more, found they injected some stuff off this issue: http://www.vbulletin.com/forum/forum...-1-vbulletin-5 And this is indeed the remnants of the known compromised site. I.e. subscriptions.php leads to that C99madShell v. 2.0 madnet edition file/exploit. So: why the blank emails every 20 minutes? I setup a test in check4hack.php changing it from: Code:
vbmail($recipent,$vbphrase['c4h_subject'],construct_phrase($vbphrase['c4h_body'], implode(", ",$storages))); Code:
vbmail($recipent,$vbphrase['c4h_subject'],construct_phrase($vbphrase['c4h_body'], implode(", ",$storages))); This explains why it 'works' for most people. One turns on 'demo', runs the cron by hand, you get the email, you turn off 'demo', and never get a 'broken' email. Can anyone smarter than me tell me why those wouldn't be set during automatic cron vs. 'run now' cron? That'd be the key to fixing it! :D |
Heya,
Thought I'd post the code of check4hack.php written by the OP. It is really short, and maybe someone browsing this can say, "oh, well that needs to be set when called by cron automatically vs. run 'by hand'" or something? Code:
<?php |
And here is an example of the Scheduled Task Log when running it 'by hand':
Code:
10311 Check 4 Hacking 10:12, 20th Sep 2013 Infects found: pluginlist Code:
10315 Check 4 Hacking 10:14, 20th Sep 2013 Infects found: pluginlist |
So for now, I changed check4hack.php from:
Code:
vbmail($recipent,$vbphrase['c4h_subject'],construct_phrase($vbphrase['c4h_body'], implode(", ",$storages))); Code:
vbmail($recipent,"Something Wrong in forum dB!".$vbphrase['c4h_subject'],"Run Check 4 Hacking in Scheduled Task Manager. This auto-email messes up, but it runs OK 'by hand'.\n\n".construct_phrase($vbphrase['c4h_body'], implode(", ",$storages))); |
I'm not sure it will make a difference but I would try commenting out the line
Code:
echo $infect['title']."-"; Code:
//echo $infect['title']."-"; echo will post data to the browser, it isn't something you usually want to do when running a scheduled task automatically, if used there should be a check to make sure it is being run manually. The thing is, while it shouldn't be used best I can tell, I don't see why it would result in blank emails- but it's the only thing that sticks out at me right now. |
I get this note as an email from the plugin:
The following modules were infected: pluginlist what do I do now? or how do I remove it |
Quote:
|
Quote:
Thanks for the idea, but it didn't fix it. :( |
@whodah thanks for pointing it out.
Code:
After .... Btw below that code you posted a link to an exploit regarding /install folder.. but I never had an install folder there after installing |
Quote:
Interesting on the install thing. For me, that is what I saw all the log files hit. For removal: this thread helped a ton: http://www.vbulletin.com/forum/forum...i-e-p0wersurge In particular, post number 4. And secondly, although a lot of it is the same, the 2nd post here: http://www.vbulletin.com/forum/forum...madnet-edition Especially bullet point #6 as the infected plugin was by author 'vbulletin'. (fake of course, and removed of course.) |
@Whodah I tried the post nr. 4:
Atm trying to clean.. but im a newbie in this.. will report |
I am also getting the following message on my vb 4.2.2 when I manually run cron job.
Quote:
Or is it saying pluginlist- is infected ? Please help |
Quote:
|
I'm also getting blank mails.
It seems that tapatalk is the reason for the mails? Version 4.8.0 Plugin: Tapatalk: Tapatalk Image Link Code:
$postbits = preg_replace_callback('/(<img src=")(http:\/\/img.tapatalk.com\/d\/[0-9]{2}\/[0-9]{2}\/[0-9]{2})(.*?)(".*>)/i', |
Hi Kolbi,
yes it is. |
I guess there's no workaround to explicit exclude this plugin?
|
uninstalled -- always sends blank email.
|
No email at all for me using demo!
vBullrtin: 4.2.2 Server Type: Linux Web Server: Apache (cgi-fcgi) PHP: 5.3.24 MySQL Version: 5.0.96-log |
As above, we installed Tapatalk 4.8.0 and started getting blank mails and an "infected" pluginlist.
I've disabled the scheduled task but left it installed so it can still be run manually... it could still be a useful tool to scan for infects on demand or if/when required. |
Quote:
|
Quote:
|
Thought I'd try a little tweak to the code. All the base64 hacks I've seen/had to clear up use the base64_decode command. The check4hack.php file looks for "%base64%" out of the box... so I did the following:
In the check4hack.php file, find the line below: Code:
$infections = $vbulletin->db->query_read("SELECT title FROM " . TABLE_PREFIX . "datastore WHERE data LIKE '%base64%'"); Code:
$infections = $vbulletin->db->query_read("SELECT title FROM " . TABLE_PREFIX . "datastore WHERE data LIKE '%base64_decode%'"); :) |
Andy.H: Hey cool. That gives me an idea. How about replacing that same line with this:
Code:
$infections = $vbulletin->db->query_read("SELECT title FROM " . TABLE_PREFIX . "datastore WHERE REPLACE(data,'\'return \\\\\'<a href=\"http://tapatalk.com/tapatalk_image.php?img=\\\''.urlencode(base64_encode($matches[2]','TAPATALK_REPLACEMENT_STRING') LIKE '%base64%'"); There might be a more eloquent way, and that wouldn't be 100% fool proof, but really really narrows it down, ya? |
Looks like there are two legit base64 in 4.2.2 PL1 -- ya?
Code:
if ((!$message = base64_decode($vbulletin->GPC['pm_message']))) { Code:
!($pagetext = base64_decode($vbulletin->GPC['html'])) |
Hmm... we're running 4.2.0 PL4 with the scheduled task running and it's not detecting those lines? Maybe they don't appear in 4.2.0?
Which files did you find them in? PS: nice addition with the detection :) |
Quote:
|
Hi Andy.H and ForceHSS,
Interesting... Digging deeper. The thing that makes me suspect is that I have a backup install on another server, different pw's, that is 100% .htaccess protected (front end and admin end) which has those same two lines... Digging, will report back... |
ForceHSS:
Are you sure you are 4.2.2 PL1 ? If so, do your install files fresh from vB not have this? Code:
includes/xml/product-panjo.xml: if ((!$message = base64_decode($vbulletin->GPC['pm_message']))) { Code:
[root@hurley upload]# grep -RIi base64_decode * |
Andy.H: for completness, I checked out 4.2.0PL4, and it looks like those lines are not in there:
Code:
[root@hurley upload]# grep -RIi base64_decode * |
Yes I have them in default files as well not sure if all as I have not checked all of them but I am sure if it is a problem vb would post about it so don't worry about it
|
Quote:
|
ForceHSS: roger that.
Andy.H: yup yup, false positives as of now. Did you see my post #110 above? I haven't had time to write a replace string for these two yet, but I'm thinking a similar notion would work here too. Thanks for the inspiration for that idea again. :D But really, we could keep whittling out false positives when they come up that way. (I think.) |
This isn't working on version 4.2.2 for me. Any plans to update this mod?
|
All times are GMT. The time now is 05:15 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|