The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#1
|
|||
|
|||
Please help with filestore exploit
I am sure you have all heard of the base64 exploit that is affecting hundreds of vbulletin users. I have had this base64 exploit for a while now. I had it last year and finally got rid of it after I updated my vbulletin but now it is back again. I have downloaded and installed this plugin which alerts you when your datastore plugins are affected. This is the email I get every morning when the exploit is injected into my forum. Can you help me out with this. What exactly does this mean and how are they injecting this code? I need to know how they are gaining access so I can stop it.
Datastore pluginlist mismatch! ================================================== ============================== Plugin modified/added: array ( 'pluginid' => '3094', 'title' => 'vBSEO Cache Templates', 'hookname' => 'cache_templates', 'phpcode' => 'if(defined(\'VBSEO_ENABLED\')) vbseo_complete_sec(\'cache_templates\'); |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|