Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


WHMCS 5.2.7 Vulnerability - Page 3
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

WHMCS 5.2.7 Vulnerability

1356789

Comments

  • @Fliphost said:
    fapvps Pretty decent response time for software that isn't theirs.

    Ohh definitely! I was not a complaining, what i meant was I hope they continue doing this in the future.

  • Who would put their WHMCS behind cloudflare? Would you give them your SSL cert too?
    They would be able to sniff all your data then. Customer's details, customer's passwords, everything.

    Thanked by 1perennate
  • Awmusic12635Awmusic12635 Member, Host Rep

    @fapvps ah yes then I agree

  • If they rewrite WHMCS completely will safe the hassle.

  • @qhoster said:
    If they rewrite WHMCS completely will safe the hassle.

    I think "audit" is suitable word than "rewrite" :P

  • @rds100 said:
    Who would put their WHMCS behind cloudflare? Would you give them your SSL cert too?
    They would be able to sniff all your data then. Customer's details, customer's passwords, everything.

    Are you being fucking serious?

    Thanked by 1Awmusic12635
  • Awmusic12635Awmusic12635 Member, Host Rep

    @rds100 What are you even going on about?

  • @Fliphost i'm afraid i don't understand your question?

  • rds100rds100 Member
    edited October 2013

    @awson yes, fucking serious. Do you know who (company and individuals) is behind cloudflare? Do you trust them enough?

    Thanked by 2Infinity perennate
  • There is already a fix out for this so the whiners who probably don't even use whmcs will have to find something else to whine about.

    They issued a patch for the latest exploit but a fix would entail having a 3rd party audit their code and WHMCS firing their current programmers and hiring programmers who didn't write crappy code and who placed a premium on security. :)

  • perennateperennate Member, Host Rep
    edited October 2013

    @Fliphost said:
    rds100 What are you even going on about?

    An external firewall implies CloudFlare would have to have access to the plain text transmissions.

    Thanked by 1rds100
  • @awson
    @Fliphost

    Cloudflare acts as an ssl endpoint so they can see and inject anything they want into an ssl session because they are between your WHMCS and your customer. This is what @rds100 was talking about.

    Thanked by 1rds100
  • Awmusic12635Awmusic12635 Member, Host Rep

    @fapvps I understand that part however

    They would be able to sniff all your data then. Customer's details, customer's passwords, everything.

    This is a bit excessive. They don't even do that. Not even going to argue though.

  • MiBMiB Member

    @qhoster said:
    If they rewrite WHMCS completely will safe the hassle.
    @CentrioHost said:
    I think "audit" is suitable word than "rewrite" :P

    "Kill it with fire" is the phrase you're looking for. With holes like that I would get rid of it as quickly as possible and wouldn't use it even if someone paid me to do so. Customers' details are worth more than that. Also, a complete rewrite wouldn't help if it were done by the same people – the result would be along the lines of "different code, same holes".

  • DomainBopDomainBop Member
    edited October 2013

    email just received from a LEB host...

    Upon investigation in light of the recent WHMCS exploit (http://blog.whmcs.com/?t=79427) it has been discovered that our client database was accessed as a result of using this exploit...

    Chances are there were probably some hosts who were compromised today and don't even know they were hacked because their technical knowledge is limited to pushing buttons in Solus/WHMCS.

  • @Fliphost said:
    fapvps I understand that part however

    This is a bit excessive. They don't even do that. Not even going to argue though.

    It does not matter what they do and don't do. From the purely technical point they can see the ssl data that passes trough them.

    Thanked by 1rds100
  • @Fliphost the truth is, we don't know if they do it or don't. Or if they would start doing it some day.
    They spend a lot of money for expensive hardware, colocation in multiple expensive data centers around the world, staff, development, etc. Then they offer it to the world for free. Could it be a PRISM-like project? Hey, they don't even need to tap-splice the fiber cables, we send them all the data for free, they play it "the man in the middle" for us. And for free.

    Thanked by 2fapvps perennate
  • Shockbyte_JShockbyte_J Member
    edited October 2013

    Official patch has been issued by WHMCS: http://blog.whmcs.com/?t=79427

  • Awmusic12635Awmusic12635 Member, Host Rep

    @fapvps I never disagreed with that part

  • And you guys think zPanel has security issues...

  • jarjar Patron Provider, Top Host, Veteran
    edited October 2013

    @rds100 said:
    awson yes, fucking serious. Do you know who (company and individuals) is behind cloudflare? Do you trust them enough?

    Would, have, do. I doubt you've had dinner with your upstream providers. Every single company has to place some faith in someone else at some point. You make the most informed decisions you can, they aren't always infallible. It is what it is. I mean for that matter how do I know every cpanel update is legit? It's about trust. Limit it best you can, but you still have to have it. That or 100% in house programming and guards at every routing point. Good luck explaining that cost to customers ;)

    Thanked by 1fapvps
  • @Fliphost

    @rds100 Simply pointed out that CF is cable of seeing everything inside of an ssl session. You and @awson asked him what he was talking about and it seemed like you were not aware that CF is able of doing that at first. A simple misunderstanding.

  • @jarland said:
    Would, have, do. I doubt you've had dinner with your upstream providers. Every single company has to place some faith in someone else at some point. You make the most informed decisions you can, they aren't always infallible. It is what it is. I mean for that matter how do I know every cpanel update is legit? It's about trust. Limit it best you can, but you still have to have it. That or 100% in house programming and guards at every routing point. Good luck explaining that cost to customers ;)

    I completely agree with you.

  • @Jeffrey said:
    And you guys think zPanel has security issues...

    That is a completely different story.

  • @fapvps Then just keep fapping..

  • perennateperennate Member, Host Rep
    edited October 2013

    @jarland said:
    Would, have, do. I doubt you've had dinner with your upstream providers. Every single company has to place some faith in someone else at some point. You make the most informed decisions you can, they aren't always infallible. It is what it is. I mean for that matter how do I know every cpanel update is legit? It's about trust. Limit it best you can, but you still have to have it. That or 100% in house programming and guards at every routing point. Good luck explaining that cost to customers ;)

    Upstream providers still wouldn't be able to grab client usernames and passwords and other sensitive data, unless they use telnet or you don't have HTTPS. On the other hand, Cloud Flare would be able to.

  • jarjar Patron Provider, Top Host, Veteran

    Meh, they get caught sniffing SSL one time they throw away all that income. Would have to be one heck of a payout, or suicide.

  • Why don't just add the proper escaping instead of shutting down the whole billing system? Providers doesnpt even know PHP?

  • perennateperennate Member, Host Rep
    edited October 2013

    @Giulio said:
    Why don't just add the proper escaping instead of shutting down the whole billing system? Providers doesnpt even know PHP?

    The source code is ioncodified?? And running decoded version is probably against their terms of service, even if it's not nulled (and you purchase a license). So... providers have to rely on them for security, even when there's a simple fix. That's part of one of the big problems with proprietary software.

  • Awmusic12635Awmusic12635 Member, Host Rep

    @jarland specifically considering all the big name sites that use them.

Sign In or Register to comment.