View Single Post
  #1  
Old 12-30-2014, 09:35 AM
thetechgenius's Avatar
thetechgenius thetechgenius is offline
 
Join Date: Jun 2014
Posts: 258
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default vB 4.1.4 - Vulnerable to SQL Injection?

So I have a few enemies online, and a few competitors.

One of them said they are going to hack my site using an SQL Injection Exploit. However, I think they are full of it. But just to be on the safe side, I thought I would post here to see what I can do to make sure it doesn't happen.
  • How would I find out if my vB 4.1.4 is vulnerable to SQL Injection?
  • If so, How would I fix that vulnerability if it is vulnerable?
  • Or maybe vB has nothing to do with SQL Injection?
  • Does it have to do with only my MySQL Server and/or PhpMyAdmin?

I also have an legit SSL Certificate, and have my site running on HTTPS throughout the entire site. I also have a legit wildcard subdomain SSL Certificate running on my PhpMyAdmin sub-domain, so my PhpMyAdmin sessions will be secure through an SSL Connection.

Note: I have my vB 4.1.4 running on my own Dedicated Server.

OS: Windows Server 2008 R2
CPU: Intel Xeon Quad Core CPU
RAM: 12GB ECC RAM
ISP: 90Mbps Download | 90Mbps Upload - Dedicated IP
NIC: 1 Gbps
Webserver: IIS 7.0 (Maybe 7.5, not really sure)
MySQL: Version 5.6
PhpMyAdmin: Version 4.1.9

If you need any more info, just ask. And thank you.
Reply With Quote
 
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.02284 seconds
  • Memory Usage 1,761KB
  • Queries Executed 11 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD_SHOWPOST
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)footer
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (6)option
  • (1)post_thanks_box
  • (1)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (1)post_thanks_postbit_info
  • (1)postbit
  • (1)postbit_onlinestatus
  • (1)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open 

Phrase Groups Available:
  • global
  • postbit
  • reputationlevel
  • showthread
Included Files:
  • ./showpost.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_postinfo_query
  • fetch_postinfo
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showpost_start
  • bbcode_fetch_tags
  • bbcode_create
  • postbit_factory
  • showpost_post
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • fetch_musername
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • showpost_complete