Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


WHMCS 5.2.7 Vulnerability - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

WHMCS 5.2.7 Vulnerability

2456789

Comments

  • perennateperennate Member, Host Rep
    edited October 2013

    @fcfc said:
    5.2.7 yes

    Are you sure it doesn't affect earlier versions? I would say disable access no matter what version you're using unless you have decoded code for your specific version.

  • @perennate said:
    Are you sure it doesn't affect earlier versions? I would say disable access no matter what version you're using unless you have decoded code for your specific version.

    Earlier versions are affected.

  • irmirm Member

    @perennate said:
    Are you sure it doesn't affect earlier versions? I would say disable access no matter what version you're using unless you have decoded code for your specific version.

    Im illiterate apparently, ignore my last comment :)

  • fapvpsfapvps Member
    edited October 2013

    Instead of adding new features perhaps they should focus on hardening the security of what they already have.

  • perennateperennate Member, Host Rep
    edited October 2013

    I went ahead and submitted tickets to most of the hosts featured on LEB in the last two months who are using and haven't disabled WHMCS yet. Some say they blocked it with mod_security rule.

  • So who got hit?

  • This has been out for at least 4 hours and I don't understand why we didn't receive an email from WHMCS themselves.

  • @seriesn said:
    So who got hit?

    No one I am aware of yet.

  • DewlanceVPSDewlanceVPS Member, Patron Provider

    You can check this by running this exploit on your own whmcs.

  • rds100rds100 Member
    edited October 2013

    They should have at least tweeted and posted in their blog though...

  • probably no one left in the office with access to do that, being at cpan conf

  • Nick_ANick_A Member, Top Host, Host Rep

    Such a strange way to put it in a Tweet.

    Thanked by 1Amfy
  • SecRule REQUEST_URI|ARGS|REQUEST_BODY "AES_ENCRYPT" "id:31337,phase:4,log,deny,msg:'WHMCS Fail'"

    Setting this rule at mod_security will fix this for now.

  • @perennate said:
    Probably. I'd recommend shutting off access to your WHMCS altogether though.

    You should give that advice to WHMCS themselves. Their vulnerable installation is still online accepting orders. //facepalm

    Thanked by 3awson VPNsh tux
  • CentrioHostCentrioHost Member
    edited October 2013

    Damn! Fuck off! As soon I reply this thread I got attack! Fuck this shit who did this to me!

    Client ID: 31183 - Endang Sukandar has requested to change his/her details as indicated below:

    >

    First Name: 'Endang' to 'AES_ENCRYPT(1,1), firstname=(SELECT GROUP_CONCAT(id,0x3a,username,0x3a,email,0x3a,password SEPARATOR 0x2c20) FROM tbladmins)'

    Last Name: 'Sukandar' to '1'

    Company Name: 'Pribados' to '1'

    Address 1: 'Parakan 9 ' to '1'

    Address 2: '' to '1'

    City: 'Bandung' to '1'

    State: 'Jawa Barat' to '1'

    Postcode: '17654' to '1'

    Country: 'ID' to 'US'

    Phone Number: '87654329' to '1'

    Default Payment Method: '' to ''

  • @CentrioHost said:
    Damn! Fuck off! As soon I reply this thread I got attack! Fuck this shit who did this to me!

    I'm guessing your fix doesn't work then? Best to disable WHMCS.

  • @Jono20201 It will not work, mod_sec rules already prevent it. However I take it down as well. Better not to take any risk. Privacy matters.

  • @CentrioHost said:
    Damn! Fuck off! As soon I reply this thread I got attack! Fuck this shit who did this to me!

    Default Payment Method: '' to ''

    It's a name of person in Indonesia.

  • @ErawanArifNugroho Yes IP also from ID :/

  • CentrioHostCentrioHost Member
    edited October 2013

    They released the patch. Just implement it..

    It seems only v5.2.7 has been affected.

  • If the vulnerable code is what I've seen, people need to flee WHMCS in DROVES.

    The fact that they explicitly whitelisted something to be unfiltered... that's not able to be called stupidity. That's a backdoor, plain and simple. What's to say they didn't just replace the whitelist with something else that they can easily find?

  • @CentrioHost said:
    They released the patch. Just implement it..

    It seems only v5.2.7 has been affected.

    All 5.x are affected.

  • That patch came out quickly. I hope they harden the security.

    Thanked by 1perennate
  • Awmusic12635Awmusic12635 Member, Host Rep

    Neat thing Cloudflare did, got this email from them:

    To our hosting partners using WHMCS,

    A critical zero-day vulnerability was published today affecting any hosting provider using WHMCS. As part of building a safer web, CloudFlare has added a rule to our Web Application Firewall (WAF) to block the published attack vector.

    To enable this rule, log into your account at CloudFlare.com, go to "CloudFlare Settings" -> "Security" -> "Manage WAF". Here you can enable the "CloudFlare Whmcs" rule to protect your website and billing system. Using this rule, hosting partners running their WHMCS behind CloudFlare's WAF and implementing best practices are fully protected from the attack.

    Our friends at WHMCS quickly published a patch here: http://blog.whmcs.com/?t=79427

    CloudFlare recommends applying the patch for your current version of WHMCS or updating WHMCS to version 5.2.8 to fully close this vulnerability.

    Thanks,

    • The CloudFlare Team

    Copyright © 2013 CloudFlare, All rights reserved.

    Thanked by 2aMunster fapvps
  • smansman Member
    edited October 2013

    @DamienSB said:
    You should remove the link to the exploit. Make people work for it.

    Yes, let's block the internets till it's fixed. Such practical advice.

    There is already a fix out for this so the whiners who probably don't even use whmcs will have to find something else to whine about.

  • smansman Member
    edited October 2013

    @Rallias said:
    If the vulnerable code is what I've seen, people need to flee WHMCS in DROVES.

    The fact that they explicitly whitelisted something to be unfiltered... that's not able to be called stupidity. That's a backdoor, plain and simple. What's to say they didn't just replace the whitelist with something else that they can easily find?

    Yes in 'droves' or gaggles even. Flee everyone flee...lol.

  • @Fliphost said:
    Neat thing Cloudflare did, got this email from them:

    This is awesome... It will be nice if CF would add these 0 day type exploits as soon as they are discovered.

  • Awmusic12635Awmusic12635 Member, Host Rep

    @fapvps Pretty decent response time for software that isn't theirs.

Sign In or Register to comment.