Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


WHMCS 5.2.7 Vulnerability - Page 4
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

WHMCS 5.2.7 Vulnerability

1246789

Comments

  • perennateperennate Member, Host Rep

    @jarland said:
    Meh, they get caught sniffing SSL one time they throw away all that income. Would have to be one heck of a payout, or suicide.

    Government agencies like the NSA undoubtedly have access to their SSL certificates. If you trust every such agency as well, then fine.

  • @perennate said:
    Government agencies like the NSA undoubtedly have access to their SSL certificates. If you trust every such agency as well, then fine.

    Big government will always sniff, you would have to unplug your ethernet cable to avoid that one.

  • @perennate said:
    Government agencies like the NSA undoubtedly have access to their SSL certificates. If you trust every such agency as well, then fine.

    Feel free to leave Earth if you're going to be this paranoid :)

  • According to a user on WHT, this exploit can still be executed even after the 5.2.8 patch. He didn't provide much information on it and no other users have reported it, so take it as you wish.

    www.webhostingtalk.com/showpost.php?p=8863086&postcount=174

  • jarjar Patron Provider, Top Host, Veteran
    edited October 2013

    @perennate said:
    Government agencies like the NSA undoubtedly have access to their SSL certificates. If you trust every such agency as well, then fine.

    I don't think dropping CloudFlare will opt you out of that. Your only option, as far as we can currently reasonably expect, is to not use the internet right now.

  • @123Systems said:
    According to a user on WHT, this exploit can still be executed even after the 5.2.8 patch. He didn't provide much information on it and no other users have reported it, so take it as you wish.

    www.webhostingtalk.com/showpost.php?p=8863086&postcount=174

    Attempt could take place, but it does not mean it will work!

  • @perennate said:
    The source code is ioncodified?? And running decoded version is probably against their terms of service, even if it's not nulled (and you purchase a license). So... providers have to rely on them for security, even when there's a simple fix. That's part of one of the big problems with proprietary software.

    It would be pretty cool if an open source alternative to WHCMS that actually worked effectively, came out.

  • fapvpsfapvps Member
    edited October 2013

    @darknyan

    Ohh how I wish... Are there any completely Open Source billing systems out there?

  • @fapvps said:
    darknyan

    Ohh how I wish... Are there any completely Open Source billing systems out there?

    Obviously it isn't going to happen for some time. Why would people make one if they couldn't make money?

    Is the mindset of most close minded individual in the world.

  • jarjar Patron Provider, Top Host, Veteran

    @darknyan said:
    Is the mindset of most close minded individual in the world.

    Incorrect. Time = money. Food = money. No money, no food. No one has found it beneficial enough that has the time to code it. Unfortunate reality? Absolutely. Closed minded? Nope, gotta eat brother.

  • I can predict the future.... someone's going to develop a new "Billing System".. I'll await the hype that's expected to pop up with the next best thing.

  • There are open source billing systems, but if you want them to provision your services you have to write plugins for them to handle things.

  • Incorrect. Time = money. Food = money. No money, no food. No one has found it beneficial enough that has the time to code it. Unfortunate reality? Absolutely. Closed minded? Nope, gotta eat brother.

    Short: no money no honey

  • DewlanceVPSDewlanceVPS Member, Patron Provider

    I want to move to Hostbillapp but they don't have a specific pricing, who is going to fill a big form and also I don't know what is "super theme client area bundle", "admin bundle"

    WHMCS = useless, release patch only for latest version.(seems localhost is owned by whmcs so they can force users to buy a latest version updates.)

  • That is why gents, i use hostbill =p

  • Using hostbill or any software for that matter does not guarantee that a 0 day will not be discovered and published tomorrow or 2 years from now...

  • MaouniqueMaounique Host Rep, Veteran

    @fapvps said:
    Using hostbill or any software for that matter does not guarantee that a 0 day will not be discovered and published tomorrow or 2 years from now...

    Exactly, we use both so the scare is double, when is not one, can be the other...
    However, building one in house is no solution either, it is likely that a company will have better programmers and more eyes will look at the code.

  • We received same attack with you, With good luck we manage to found it and deleted the client within 10sec and put the WHMCS into maintenance mode. After upgrade we released the WHMCS for more than 3 hours and it's seem all look fine now.

    @CentrioHost said:
    Damn! Fuck off! As soon I reply this thread I got attack! Fuck this shit who did this to me!

    Default Payment Method: '' to ''

  • I've started using Blesta, which albeit needs a few more features as it's pretty new, seems like it could be great once everythings added in. Plus the point that only two files are encoded - I moved from WHMCS as soon as the beta of Blesta came out.

  • I'm worried that some hosts may not be aware that they were breached. I know this may be teaching some people to such eggs; however having a good hard look at the logs would be a wise idea.

  • literally one day after I installed and leased this software. Great.

  • @ztec said:
    literally one day after I installed and leased this software. Great.

    Its patched now.

  • Nice.

  • DewlanceVPSDewlanceVPS Member, Patron Provider

    @wych said:
    Its patched now.

    Only 5.1 and 5.2 version is patched not 5.0 and some other version is patched.

  • @DewlanceVPS anyone still running 5.0 has been probably already hacked long ago. It's EOL, not supported, etc.

    Thanked by 1SpeedBus
  • I thought Dewlance is retired

  • wychwych Member
    edited October 2013

    @DewlanceVPS said:

    @rds100 said:
    DewlanceVPS anyone still running 5.0 has been probably already hacked long ago. It's EOL, not supported, etc.

    Do providers not update/renew older copies then? :\

  • BrianHarrisonBrianHarrison Member, Patron Provider

    @fapvps said:
    http://localhost.re/p/whmcs-527-vulnerability

    Confirmed exploit.

    Disable WHMCS until this is fixed.

    With some basic security precautions, this isn't much of an issue. Our standard set of mod_security rules blocked this exploit as well as a few other variations I tried out.

    Of those of you out there running mod_security, I highly recommend the rules published by Atomic Corp (http://www.atomicorp.com/products/modsecurity.html).

  • @perennate said:
    The source code is ioncodified?? And running decoded version is probably against their terms of service, even if it's not nulled (and you purchase a license). So... providers have to rely on them for security, even when there's a simple fix. That's part of one of the big problems with proprietary software.

    Good point.
    This is really stupid for 2 reasons:
    1) provider shouldn't trust third parties for billing software
    2) encoding is a really dumb thing, exactly like DRM. It doesn't stop bad people but limits customers.

  • MiBMiB Member

    @BrianHarrison said:
    With some basic security precautions, this isn't much of an issue. Our standard set of mod_security rules blocked this exploit as well as a few other variations I tried out.

    Having to "fix" severe security issues of a service by blocking malicious requests with an application firewall definitely seems like an issue to me, especially if that service holds sensitive customers' data. The potential loss of customers' trust and a big fine for leaking personal info after a successful exploit are not worth it for me.

    Thanked by 1fapvps
Sign In or Register to comment.