![]() |
How to stop CloudFlare / Incapsula bypass for vBulletin.
1 Attachment(s)
Hi,
There are a few methods to bypass CloudFlare and Incapsulas protection to get the originating server ip, the first being mail server headers (so what I do is use a third party server with modified mail headers that remove the sender IP which would be the server we are trying to protect) and the second is vBulletins image retrieval. At the moment vBulletin has the following ;
This is bad! Anyone could simply use an ip logger such as this and then could insert the fake image into the URL field to download it would grab the source ip and bypassing CF/Incapsula. What originally I was doing was editing the template and removing option 1 (the ability to retrieve image url) but as it turns out this is no good, because you can just inject the original code using firebug or element inspector and pretend nothing was ever gone! I did this for months until it was brought to my attention two days ago! The work around. We need to disable the following in php.ini (really only the fopen but include stops offsite injections). Code:
allow_url_fopen = Off Edit includes/class_upload.php find Code:
if (ini_get('allow_url_fopen') == 0 AND !function_exists('curl_init')) Code:
if (ini_get('allow_url_fopen') == 0) https://vborg.vbsupport.ru/external/2014/07/2.png |
nice to share your fixes
|
Happy to help :)
|
Great share.
Thanks a lot. |
by the way, if we turned off the Curl php function the image insertion property won't work anymore. it will give you an error saying " remove upload has been disabled" or similar message...
is there a fix for this because Curl php is important function for vb board... |
Quote:
|
All times are GMT. The time now is 02:14 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|