The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#11
|
|||
|
|||
Right now i have the exactly same problem. Does anyone know how to solve this problem please ? I am running my own dedicated server but since am not good with server management, i do not have any idea about what to do on server side if it's not about a file removing or something like that...
|
#12
|
|||
|
|||
I saw this for the first time on a client's install two or so months ago. None of the vBulletin files were modified and the database was clean so I was stumped at first. It turns out this particular exploit uses vB's plugin/hook system; if you see a strange plugin (note I said plugin, not product), remove it. Then, find out how it got on there. xD
Just read a document on this exploit; bad file permission or upload script setups could allow something like this to happen. |
#13
|
|||
|
|||
I think Shell is malicious
|
#14
|
||||
|
||||
Quote:
What actually happens is they use sql injection via an unsafe modification to install a plugin on the ajax hook, then use that malicious plugin to install the file. If you forum directory was properly secured as read only (to apache) then that wget would fail to actually save the file. |
#15
|
|||
|
|||
How would I get rid of this ive been comprimised as well...
Is it in a folder in FTP is it a CODE I can delete etc |
#16
|
||||
|
||||
Quote:
Edit: You can try POST #4 shown in this thread - https://www.vbulletin.com/forum/show...i-e-p0wersurge |
#17
|
|||
|
|||
Look into the PLUGIN MANAGER and check for any suspect plugins installed. I found 4 of them.
This is a period of nasty hacking time. |
2 благодарности(ей) от: | ||
CAG CheechDogg, TheLastSuperman |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
More Information | |
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|