![]() |
Official Policy: When Security Vulnerabilities in Hacks are Found
good idea, hope it proves successful :)
|
Sounds good.
|
Great idea!
Maybe you could also create a special topic category on the Contact Us for "Security Issue" currently there is just Site Feedback and Registration topics. Regards, Matt |
Great idea! Thanks guys.
|
Looks good overall - just one point ;
7 days is a bit short - authors can be away for that long simply due to being on holiday. If you move to step 5 after this small a time you may be wasting effort. :) |
/me LIKE Policies...
|
7 days might seem short from a coders point of view, but it can be long from the end-users point of view, depending on how serious the risk is.
|
Oh well, it just seems that you are commiting yourselves to removing a hack, and someone spending time on fixing someone elses bug(s), when the author would be quite willing, but was simply away for a few days. Two weeks just seems a more reasonable time. :)
|
Quote:
As a precaution, and to stop more people installing this (bugged) hack, we feel it is our duty to temporarily remove it. |
I'm with it!
|
Quote:
|
I think this is a double edged sword. I kind of agree with everything here but at the same time I think the nature of the vulnerability should be made known to the people that have installed it at least. Perhaps some of them can patch it.
The better question is what if its not a serious vulnerability or if its an issue that would only affect a specific yet minor group? Like say people running the hack on ISS would be vulnerable but on apache it wouldn't or something. ? Like say for instance it only affects a |
Quote:
I applaud this, and just hope I have managed to fix all holes so this never happens to me XD |
The kind of information on the risk that we give, will be based on the kind of vulnerability.
|
Quote:
Members who we trust who contact us may be given full information though. It's a case by case thing - we can't make rules for every case but we can make general protocols. |
Speaking as someone who did have a hack installed on a forum which did have a vulnerability which gave people access to the admincp (obviously keeping this vague because I don't want to upset the person who wrote the hack) I applaud this idea! :)
|
Quote:
I didnt even notice the journal issue until I was reading through the thread just now. |
Quote:
|
What about exceptions Erwin, like another party other than the original author(s) step in and provides a decent patch or fix to the problem?
|
Quote:
|
Sounds like a good solution if a problem like this is ever found.
|
Good to see this new policy in place. Great news.
|
I must have missed the bit that says you will close the thread - what exactly does this achieve besides denying anyone further support ?
|
Quote:
|
Quote:
|
Any policy will need refining, but putting the code on hold and trying to avoid the exploit being spelled out till fixes are applied is a good idea.
|
Quote:
|
very good !
|
I like the policy and the fact that exploits are not fully discussed in public. I am just glad I have always clicked "INSTALL" and I think this policy will further encourage all members to always click "INSTALL" with every hack they use.
|
I think this is a great idea!
I would also encourage the vb.org staff to write a short tutorial on what to look for, preventing, what is ??, etc, etc something short and to the point ... at the very least, it will make your job easier |
sorry to bring back such a old thread but i take it they dont do this anymore??? cause from what i see [AJAX] vBShout v2.0 has numerous Security Vulnerabilities and it seems the author dont even reply nor does he update it...
|
Report the hack, and we will look into it.
|
ZT has not been online since Jan 2006, so he's not likely to answer any queries.
|
yeah thats what i mean and any new person will say great hack but they fail to realize that there are numerous flaws in it...
|
It would have been nice for you to report said flaws so I didn't have to spend 30 min looking though the thread :p but I've outlined the issues I saw, and we will take a look at it.
|
All times are GMT. The time now is 04:44 PM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|