vb.org Archive

vb.org Archive (https://vborg.vbsupport.ru/index.php)
-   Community Lounge (https://vborg.vbsupport.ru/forumdisplay.php?f=13)
-   -   Hacking Question (https://vborg.vbsupport.ru/showthread.php?t=296899)

boxingscene 04-05-2013 07:17 PM

Hacking Question
 
Did not mean to make this thread twice.

Someone hacked my vbulletin with a malicious code in the footer, which he placed on two of our themes. From what I can tell he did not access the backend or corrupt any files. Our admincp is password protected via .htaccess and I see nothing in the control panel logs of someone being in there and making those kind of template changes.

I did see that he uploaded a shell script in subfolder of another script. Could he have used that file to access the mysql server directly to corrupt the vbulletin script?

I'm stumped otherwise.

TheLastSuperman 04-05-2013 08:11 PM

Yes shell scripts can contain code to modify files and access the database, I would remove the shell script and also ask your host to do any server side scans they have to ensure it's clean.

Also follow the methods outlined here:
http://www.vbulletin.com/forum/blogs...iller/3934768-

boxingscene 04-06-2013 08:42 PM

Quote:

Originally Posted by TheLastSuperman (Post 2414551)
Yes shell scripts can contain code to modify files and access the database, I would remove the shell script and also ask your host to do any server side scans they have to ensure it's clean.

Also follow the methods outlined here:
http://www.vbulletin.com/forum/blogs...iller/3934768-

He is uploading these files using these kinds of commands. Is there any way to block this or how exactly is he able to do this??? He is using VB files to upload shell scripts it appears.


"GET /tmp/clientscript/yui/yahoo-dom-event/yahoo-dom-event.js?v=382
HTTP/1.1" 404 32091 "http://www.XXXXXXXXXXXXXXXXXXX.com/tmp/w.php3" "Opera/9.80
(Macintosh; Intel Mac OS X 10.8.2) Presto/2.12.388 Version/12.14"
176.62.111.131 - - [20/Mar/2013:04:08:37 -0400] "GET /tmp/clientscript/vbulletin_global.js?v=382
HTTP/1.1" 404 32053 "http://www.XXXXXXXXXXXXXXXXXX.com/tmp/w.php3" "Opera/9.80
(Macintosh; Intel Mac OS X 10.8.2) Presto/2.12.388 Version/12.14"

BirdOPrey5 04-09-2013 12:34 PM

VB 3.8.7 is the only 3.x version without known exploits. Anyone running 3.x should have upgraded by now... Or, as in the case of this site, be able to code fixes themselves.

I'm not sure if the yahoo yui script is to blame, but you should most definitely be using a remote YUI site- you can set this in Admin CP - Settings -> Options -> Server Settings and Optimization Options


All times are GMT. The time now is 06:43 AM.

Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.

X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.01085 seconds
  • Memory Usage 1,719KB
  • Queries Executed 10 (?)
More Information
Template Usage:
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)bbcode_quote_printable
  • (1)footer
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (6)option
  • (1)post_thanks_navbar_search
  • (1)printthread
  • (4)printthreadbit
  • (1)spacer_close
  • (1)spacer_open 

Phrase Groups Available:
  • global
  • postbit
  • showthread
Included Files:
  • ./printthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/class_bbcode_alt.php
  • ./includes/class_bbcode.php
  • ./includes/functions_bigthree.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • printthread_start
  • bbcode_fetch_tags
  • bbcode_create
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • printthread_post
  • printthread_complete