The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
|||
|
|||
![]()
I have come across a "hack" that was done to a bulletin board (very recently),
that scares the bejeezus out of me. I can see this happening pretty much on any bulletin board which uses any form of "sql" database. In this specific case, they logged in, changed their session ID to "1", refreshed the page, then wreaked havoc all over the site. I have the specific code used to perform this hack, but do not want to merely display it here (for obvious reasons). Who/How can I discuss this and what can/should I do to prevent it from happening on my site? |
#2
|
|||
|
|||
![]()
First make sure you are updated with the latest vbulletin and turn off the plugin system. This should help stop any breaches of security.
Report the bug to vbulletin.com, I think they use their project management tool to do this now. Hope this helps |
#3
|
||||
|
||||
![]()
Heh, if only it was that easy to hack a board...
|
#4
|
||||
|
||||
![]() Quote:
![]() |
![]() |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|