The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
|||
|
|||
Security Issue ?
I'm just an admin at a site running 3.8.5; I don't have the licensing info, so I couldn't post this in the proper forum. I'm sorry.
I've recently discovered a PHP injection scheme using the "Upload from URL" feature. Here's the scenario: 1) Someone creates a URL on their own server that looks like an image url (allowed attachment type). 2) Their server dynamically changes the mime content type to txt/php. 3) Once the attachment is uploaded, the user can run the script directly out of their attachments folder... eg... user ID of 123... script name of exploit.php gives-- www.yourserver.com/attachments/1/2/3/exploit.php Maybe this has been reported before; but we've had a script kiddie inject an email script into our server, and he's been sending spam from it. Maybe there's another way to get a php file uploaded through the attachments--we're certainly not allowing any php extensions in our allowed extensions. Thanks F. |
#2
|
||||
|
||||
.php extension shouldn't really be allowed to be uploaded.
In a sane environment, the attachment directory shouldn't be accessible from the web as well. It's not really a security hole, rather than the way php scripts work combined with poor server/forum configuration which makes misuse possible. |
#3
|
|||
|
|||
Thanks.
Perhaps we can have our host restrict browsing in the attachments folder (which is in side the httpdocs--document root, making it accessible through http) --------------- Added [DATE]1330925858[/DATE] at [TIME]1330925858[/TIME] --------------- A little more investigation led me here: https://www.vbulletin.com/forum/show...t-please-check That script is similar to the one we found on our site (twice). We've put .htaccess files in the custom* directories, as well as the root of the attachments directory. Hopefully that will deny all future access to injected PHP on the forum. Thanks again, F |
#4
|
||||
|
||||
This is why it's long been the standard that the attachments repository be located outside the webroot. As a temporary measure, it's best to disable the PHP interpreter altogether for the attachments directory. This means that no matter what extension a file is masqueraded as, the PHP executable will not parse it.
|
#5
|
||||
|
||||
|
#6
|
|||
|
|||
Thanks guys. Seems the configuration was fubar from the start. If it were me, we'd start over.
We're good now, though. |
#7
|
||||
|
||||
Title updated to avoid confusion.
|
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|