Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


WHMCS 5.2.7 Vulnerability - Page 5
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

WHMCS 5.2.7 Vulnerability

1235789

Comments

  • smansman Member
    edited October 2013

    I love how these threads always manage to bring out the paranoid 'security experts' who have lots to say about things that most have no clue about.

    Thanked by 1fapvps
  • BrianHarrisonBrianHarrison Member, Patron Provider
    edited October 2013

    @MiB said:
    Having to "fix" severe security issues of a service by blocking malicious requests with an application firewall definitely seems like an issue to me, especially if that service holds sensitive customers' data. The potential loss of customers' trust and a big fine for leaking personal info after a successful exploit are not worth it for me.

    I think you're misinterpreting my post. Mod_security is not a fix nor is it a final solution. Everyone should patch their WHMCS just as we did at the earliest opportunity. Nevertheless, mod_security and our rule set had us protected before this exploit was even posted. That's why I say if you have mod_security, then this exploit wasn't much of an issue.

    Anyone running Apache who hasn't installed mod_security, should do so. With zero-day exploits you may not have enough time to yank your software offline or apply a vendor security patch before you get hacked.

  • ShardHost and 2GBVPS has been hacked. At least they have sent me an email.

  • Is there a possibility that some LEB/T members have been involved in taking host details form here and hacking hosts' sites?

  • ReeceReece Member
    edited October 2013

    @qtriangle said:
    Is there a possibility that some LEB/T members have been involved in taking host details form here and hacking hosts' sites?

    Really really wouldn't surprise me. But theres also a bunch of kids which like to cause mayhem here.

  • ClientExec or Blesta - that is the question. :)

  • @Reece said:

    ...theres also a bunch of kids which like to think they cause mayhem here.

    Fixed.

  • c0yc0y Member

    @sman said:
    I love how these threads always manage to bring out the paranoid 'security experts' who have lots to say about things that most have no clue about.

    I love how ignorant, utterly stupid and blind you are :-)

    Maybe if you had more than 3 brain cells you would have noticed that the exploit has been confirmed and that big providers could have maybe got hit if it wasn't broadcasted here.

    You seem to have no clue about anything in life, according to what you post...

  • smansman Member
    edited October 2013

    @Netxons said:
    We received same attack with you, With good luck we manage to found it and deleted the client within 10sec and put the WHMCS into maintenance mode. After upgrade we released the WHMCS for more than 3 hours and it's seem all look fine now.

    If you implement the further security steps whmcs suggests it would not be a problem anyways. In particular, change the admin folder name and password protect it.
    http://docs.whmcs.com/Further_Security_Steps

  • @Frost said:
    You seem to have no clue about anything in life, according to what you post...

    Don't you think that's a bit harsh? I mean, you can disagree with the guy but to become so insulting is quite uncalled for IMHO.

  • c0yc0y Member

    @mpkossen said:
    Don't you think that's a bit harsh? I mean, you can disagree with the guy but to become so insulting is quite uncalled for IMHO.

    It was in reference to how he as ignorant person thinks we have no clue about this and that we're talking shit and that there isn't a (new) exploit

  • @Frost said:
    It was in reference to how he as ignorant person thinks we have no clue about this and that we're talking shit and that there isn't a (new) exploit

    There's like three lines of text he posted in this thread? How did you jump to those conclusions from that? He never said something about you. He just stated that, in general, there's usually quite some chatter in these threads that is not based on facts and is often untrue. That doesn't make him ignorant.

  • c0yc0y Member
    edited October 2013

    @mpkossen said:
    There's like three lines of text he posted in this thread? How did you jump to those conclusions from that? He never said something about you. He just stated that, in general, there's usually quite some chatter in these threads that is not based on facts and is often untrue. That doesn't make him ignorant.

    Any sane person with eyes in his head would see that the exploit has been PROVED/CONFIRMED. He just started not responding to me after I proved him wrong a million times, which is good :-) but that doesn't mean I shouldn't point out how his statement is bogus

  • @Frost said:
    Any sane person with eyes in his head would see that the exploit has been PROVED/CONFIRMED. He just started not responding to me after I proved him wrong a million times, which is good :-) but that doesn't mean I shouldn't point out how his statement is bogus

    Where did he say it wasn't an exploit?

    I still fail to see how this is not just a unfounded rage again @sman. It's fine if you have a problem with him, but settle it elsewhere.

  • @Frost I completely agree with @mpkossen, @sman did not say anything to deserve such a response.

    Thanked by 1mpkossen
  • c0yc0y Member

    @fapvps said:
    Frost I completely agree with mpkossen, sman did not say anything to deserve such a response.

    @sman said:
    I love how these threads always manage to bring out the paranoid 'security experts' who have lots to say about things that most have no clue about.

    That's exactly what he does himself, but not just security related topics, look at his post history...

    Good example, the post not long after mine:

    @sman said:
    If you implement the further security steps whmcs suggests it would not be a problem anyways. In particular, change the admin folder name and password protect it

  • fapvpsfapvps Member
    edited October 2013

    @Frost I see the context now. Still a bit harsh but understandable.

  • @Frost said:
    That's exactly what he does himself, but not just security related topics, look at his post history...

    @Frost said:
    It was in reference to how he as ignorant person thinks we have no clue about this and that we're talking shit and that there isn't a (new) exploit

    So that makes you say this? Him voicing his opinion just like everybody else here? He didn't even mention names nor was that his intention.

    If he's wrong just explain to him why you think he's wrong. There's no reason to start a personal attack and rage at him for those comments. If that's not an option, you'd better not respond at all.

  • c0yc0y Member

    @mpkossen said:
    If he's wrong just explain to him why you think he's wrong. There's no reason to start a personal attack and rage at him for those comments. If that's not an option, you'd better not respond at all.

    If you took the time to do what I said: check his post history, you would see what stupid statements he made in the past and then attacking me for proving him wrong.

    If you want to be a moderator then don't go point fingers at stuff you don't like without knowing what happened besides that. Can't come back from a honeymoon and go play policeman in arguments you have 0 perspective on

  • @Frost said:
    He just started not responding to me after I proved him wrong a million times, which is good :-)

    Or because he's smarter. I asked him kindly some time ago to avoid you same as I asked you. He got it you don't get it and still bringing things on personal level. No one demand from you to agree with his views but stop bringing things on personal level insulting him whatever he say.

  • c0yc0y Member

    @Spirit said:

    I proved his bogus wrong, what if somone thought password protecting the admin folder would actually fix it? Yes, I sometimes respond too personal to him but god his attitude

  • smansman Member
    edited October 2013

    @fapvps said:
    ....understandable.

    Do you disagree with the whmcs recommendations? I took the time to figure this out because I actually use whmcs.

    The exploit theorietically can allow hackers to get the admin password hash. In order to use it they then need to access the admin directory. If you rename the admin directory as per whmcs recommendation it creates more work for them. If you then add a .htaccess password as per whmcs enhanced security recommendation they will not gain access by using this exploit.

    Simple as that. Just the facts. No hyperpole, no FUD.

    If you disagree then go argue with WHMCS.
    http://blog.whmcs.com/news.php?t=79527

    WHMCS said:
    If the attacker is able to extract the true admin user password value, they would then need to also know the exact location of the admin login page as well as have access to load it. As described in our recommended further security steps, WHMCS provides an extra layer of protection to help mitigate the unauthorized access into the administrative area by allowing a custom admin folder path. We also recommend restricting IP access to that folder with an htaccess file.

  • c0yc0y Member
    edited October 2013

    @sman said:

    Do you disagree with the whmcs recommendations? I took the time to figure this out because I actually use whmcs and earn a living from it.

    The exploit theorietically can allow hackers to get the admin password hash. In order to use it they then need to access the admin directory. If you rename it that creates more work for them. If you then add a .htaccess password they will not gain access by using this exploit.

    Simple as that. Just the facts.

    Stating false facts, yes. Because it was done with the register.php, but could be done with any user input going into MySQL

  • fapvpsfapvps Member
    edited October 2013

    @sman I was just saying that I understand why @Frost wrote the post the way he did. The understandable part only relates to that and has nothing to do with WHMCS. I didn't know you guys have some sort of feud going on and I don't want to be caught in the middle. Sorry for any confusion or misunderstanding on my part or yours.

  • smansman Member
    edited October 2013

    @fapvps said:

    Lol...it takes two for a 'feud'. I have better things to do then argue with a child or someone with the emotional intelligence of one. It is amusing to watch though.

  • Can't we all just...get along?

  • smansman Member
    edited October 2013

    @fapvps said:
    Can't we all just...get along?

    Just let it go. You are only feeding the troll on training wheels.

  • @sman said:

    That exploit allows you to run any SQL code you want, it's not something just gives you the admin login credentials. Anyone could easily get all user info, vps ips and root passwords, credit card numbers if any stored. Also, an attacker could just destroy your whole database with that exploit.

  • smansman Member
    edited October 2013

    @serverian said:

    Perhaps you should argue that point with WHMCS then. That is not what they are saying if you take the time to read their post...carefully.

    They do mention some non-specific generic possibilities with sql injection but not that it was part of this exploit or even if it's possible. Have you seen any of these in the wild? Please provide the exactly 'code' you are referring to if you have. Not interested in generalities like 'it's a risk because...well just because theoretically it is'.

    99.9999999% of the attacks will be that exact exploit. The guys who are good enough to figure out more then that if it's even possible won't be pissing around going after joe blow hosting company. They are too busy trying to hack into banks and getting hundreds of thousands of credit card numbers.

    If you are paranoid about 'what if's' then you are in the wrong business anyways. There is always a risk as long as you are connected to the internet. Adobe just got hacked and had a bunch of customer details including credit card numbers and a bunch of their source code stolen. You going to stop using Adobe now? There...is...always...a...risk.

Sign In or Register to comment.