Go Back   vb.org Archive > Community Central > Community Lounge
FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools Display Modes
  #1  
Old 04-05-2013, 07:17 PM
boxingscene boxingscene is offline
 
Join Date: Sep 2004
Posts: 123
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default Hacking Question

Did not mean to make this thread twice.

Someone hacked my vbulletin with a malicious code in the footer, which he placed on two of our themes. From what I can tell he did not access the backend or corrupt any files. Our admincp is password protected via .htaccess and I see nothing in the control panel logs of someone being in there and making those kind of template changes.

I did see that he uploaded a shell script in subfolder of another script. Could he have used that file to access the mysql server directly to corrupt the vbulletin script?

I'm stumped otherwise.
Reply With Quote
  #2  
Old 04-05-2013, 08:11 PM
TheLastSuperman's Avatar
TheLastSuperman TheLastSuperman is offline
Senior Member
 
Join Date: Sep 2008
Location: North Carolina
Posts: 5,844
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Yes shell scripts can contain code to modify files and access the database, I would remove the shell script and also ask your host to do any server side scans they have to ensure it's clean.

Also follow the methods outlined here:
http://www.vbulletin.com/forum/blogs...iller/3934768-
Reply With Quote
  #3  
Old 04-06-2013, 08:42 PM
boxingscene boxingscene is offline
 
Join Date: Sep 2004
Posts: 123
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Quote:
Originally Posted by TheLastSuperman View Post
Yes shell scripts can contain code to modify files and access the database, I would remove the shell script and also ask your host to do any server side scans they have to ensure it's clean.

Also follow the methods outlined here:
http://www.vbulletin.com/forum/blogs...iller/3934768-
He is uploading these files using these kinds of commands. Is there any way to block this or how exactly is he able to do this??? He is using VB files to upload shell scripts it appears.


"GET /tmp/clientscript/yui/yahoo-dom-event/yahoo-dom-event.js?v=382
HTTP/1.1" 404 32091 "http://www.XXXXXXXXXXXXXXXXXXX.com/tmp/w.php3" "Opera/9.80
(Macintosh; Intel Mac OS X 10.8.2) Presto/2.12.388 Version/12.14"
176.62.111.131 - - [20/Mar/2013:04:08:37 -0400] "GET /tmp/clientscript/vbulletin_global.js?v=382
HTTP/1.1" 404 32053 "http://www.XXXXXXXXXXXXXXXXXX.com/tmp/w.php3" "Opera/9.80
(Macintosh; Intel Mac OS X 10.8.2) Presto/2.12.388 Version/12.14"
Reply With Quote
  #4  
Old 04-09-2013, 12:34 PM
BirdOPrey5's Avatar
BirdOPrey5 BirdOPrey5 is offline
Senior Member
 
Join Date: Jun 2008
Location: New York
Posts: 10,610
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

VB 3.8.7 is the only 3.x version without known exploits. Anyone running 3.x should have upgraded by now... Or, as in the case of this site, be able to code fixes themselves.

I'm not sure if the yahoo yui script is to blame, but you should most definitely be using a remote YUI site- you can set this in Admin CP - Settings -> Options -> Server Settings and Optimization Options
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 02:54 AM.


Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.03383 seconds
  • Memory Usage 2,189KB
  • Queries Executed 13 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)ad_showthread_beforeqr
  • (1)ad_showthread_firstpost
  • (1)ad_showthread_firstpost_sig
  • (1)ad_showthread_firstpost_start
  • (1)bbcode_quote
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)navbar
  • (3)navbar_link
  • (120)option
  • (4)post_thanks_box
  • (4)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (4)post_thanks_postbit_info
  • (4)postbit
  • (4)postbit_onlinestatus
  • (4)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available:
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files:
  • ./showthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • forumjump
  • showthread_post_start
  • showthread_query_postids
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • fetch_musername
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • showthread_complete