![]() |
Exposing the user to harm
I don't know, maybe this gets deleted. I think it's valuable site feedback. When a security vulnerability is found in software, there is a specific sequence of events every commercial and open source site I've ever work with, or for, follows.
1) Fix it. 2) Post the patch. 3) Inform the users about the availability of the patch. This is done to protect the users. Any other sequence puts the users at great risk of harm because it announces a security vulnerability before a fix is available. It actually alerts the people who might wish to do harm that a vulnerability exists and has not been patched. Further, you don't give out specifics, such as saying it's an HTML injection issue, until after the patch has been made available. Once again, to keep that information from the hands of those that would do harm. The policy here is backwards, and potentially damaging. |
/me gives a hug to hambil !!!
|
/me laughs at all of the stuff going on lately
|
I agree, and it sounds good. Needs to go through with the plan!!
|
*deezelpope gives hugs to all you guys...cuz she luvs you and cuz she can.
|
/me needs a hug too
|
*deezelpope giggles and hugs Dream...and asks, anyone else?:D
|
/me wants to know if you want one from me.
/me looks at the clock and realizes its way past my bed time. Night all |
*deezelpope says, sure, why not, she's a very loving person.:) Nighty night, Mike.:D
|
The problem is though, unlike the developers you talk about, coders here may have a lack of action.
|
Alright guys, can we keep to the topic please :)
Chris |
There is a big difference between commercial sites and here - your proposal relies on the author actually fixing it - experience shows that this is rarely the case for free modifications released here (take vbplaza, that's still not fixed, months after the holes were found and notified to the author).
We have to have a policy that suits the majority of cases here, and the one we currently have serves that purpose - and while it may not have been ideal for your case, your's is, I'm afraid, an exception, not the rule - the last few have either not been fixed, taken a while to get fixed, or in a couple of cases a staff member has eventually fixed them. However, we will review what we do to see if it can be tweaked to suit cases where the author is known to be still active. Of course, it won't make any difference to you since you decided to take all your mods away anyway. |
Quote:
Quote:
For such a dramatic change in policy to take place, and for an active hack author to not even know about it, is a serious flaw in the conduct of business - regardless of what you say about the rules being posted. How about a show of 'virtual hands' for coders who had no idea a policy change had been implemented? I'm sure I'm not alone. That aside, I still think it's a flawed policy. The email that went out to all the users stated: This modification contains a MySQL injection vulnerability It was also put into the thread itself in nice large red letters: This modification contains a MySQL injection vulnerability This puts every user of the hack at risk. It also creates a nice little searchable database for anyone who might want to start hacking VB sites. It's an all around bad idea. |
Quote:
/speech :) |
Quote:
|
He or she is here for the styles I think, from her signature.
/me has an inflated ego |
At vBhackers, we have a system in place that staff use. If a hack has either been a complete rip of someone elses work (usually stolen from here) or contains a security vulnerability, then staff simply put the hack into a "investigation mode". This then places the thread in a moderation queue, a pm is sent to the author and a new thread is created in the staff section to inform other staff members, this is all automatic.
Maybe the vb.org staff can come up with a similar system to handle these problems. |
Quote:
|
Quote:
Quote:
|
The policy has two sides
If a security hole is found, it is up to users to uninstall the hack. It is also a good idea to not let it be downloaded and for a warning to be put up. But then letting the author know before hand is also good. If they're not active, take it down Thats just my opinion |
Quote:
anyway, these discussions are completely worthless... if you are not happy with an administration, create your own and start your project... you'll be the one to deal with your problems... |
Quote:
|
Quote:
|
Quote:
|
Quote:
If you don't keep up with the hacks on your site, that's your problem ;) just my 2cents :D |
Quote:
|
Quote:
|
Quote:
The biggest problem facing board owners using third party software is bugs, not security flaws. And skins can, and do, introduce plenty of bugs. |
This thread is about security holes. I do agree with your position about how notification takes place, however.
|
Quote:
Quote:
disabled it, if they haven't, then its their own fault, they have been warned, Twice... |
Quote:
We are all very much aware that the installed number only represents a portion of the actual installs. In a recent vbBux thread, the problem is referred too as a 'security exploit' which is a better way to go. |
How it should be worded is always debatable, everyone has their own views.
I believe users should be told whether it's XSS or MySQL or whatever - without further details you cannot exploit it anyway. |
with any detail like "sql inject" or "xss exploit", you can exploit any hack because they are not encoded... with a hack with a single sql query, it is easy to learn how the inject can be done...
if instead you contact the coder, that coder make the change in a reasonable delay, and then update his script without noting the exploit, it would be infinate the risk of a hacker trying to reproduce the exploit and profit from it... and btw,as anybody can suggest changes to a hack to the coder, why not providing a fix yourself as you already know the exploit, so the coder simply have to update its release... this is a community of sharing after all... |
I'd also recommend that as new exploits are discovered, they are given examples, along with the fix, in the private coders forum - probably in a sticky, indexed thread. This way coders can keep up on their old hacks, and avoid possible problems with their new ones.
|
All times are GMT. The time now is 03:52 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|