Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


WHMCS 5.2.7 Vulnerability - Page 6
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

WHMCS 5.2.7 Vulnerability

1234689

Comments

  • @sman said:
    Perhaps you should argue that point with WHMCS then. That is not what they are saying if you take the time to read their post...carefully.

    I don't have to. They are full of bullshit.

    Thanked by 2fapvps DewlanceVPS
  • From the WHMCS Blog:

    "Please note that due to the nature of SQL Injection attacks, it is possible to do more that just information disclosure if the attempt was successful. We encourage you to look at the injected values and identify the exact SQL statements used by the attacker from the log entries prior to applying the patch; from this information you can known what database values the attacker was seeking to access or update."

    From my understanding an attacker can get all kinds of information from the db using this attack vector and the extra security steps will not prevent a data leak.

  • smansman Member
    edited October 2013

    @fapvps said:
    From the WHMCS Blog:

    "Please note that due to the nature of SQL Injection attacks, it is possible to do more that just information disclosure if the attempt was successful. We encourage you to look at the injected values and identify the exact SQL statements used by the attacker from the log entries prior to applying the patch; from this information you can known what database values the attacker was seeking to access or update."

    From my understanding an attacker can get all kinds of information from the db using this attack vector and the extra security steps will not prevent a data leak.

    Please provide the exact code for doing that. Alternatively, please provide a link to code posted somewhere for doing that. Right now the ONLY exploit is getting admin password hash.

    It is my understanding that an attacker can break into any bank and get all kinds of information from the db. So now what? We should all close our bank accounts?

  • @sman said:
    If you are paranoid about 'what if's' then you are in the wrong business anyways. There is always a risk as long as you are connected to the internet. Adobe just got hacked and had a bunch of customer details including credit card numbers and a bunch of their source code stolen. You going to stop using Adobe now? There...is...always...a...risk.

    Man, if you didn't understand what that vulnerability was, here it is:

    It allows you to run any SQL code if you start it with "AES_ENCRYPT". So people didn't even have to run that exploit code. They can just login to their client area and just type any SQL code they want starting with "AES_ENCRYPT(1,1), FIELDNAME=" and it'll be executed. So someone could just run this to drop the clients table: "AES_ENCRYPT(1,1), firstname=(SELECT * FROM (DROP TABLE tblclients))"

    Got it?

    Thanked by 1fapvps
  • smansman Member
    edited October 2013

    @serverian said:
    Got it?

    Did you try it? Please provide the results. If that is too much work how about providing one verified known case of this being done to someone. Not the admin access because I know that is possible. Not read access either. I am talking about something not requiring admin access allowing changes directly to a sql database as you suggest.

    I suggest you stop using whmcs if you are worried about it. Better yet cut all your internet access or make it so hard to use that you lose all your customers.

    There...is...always...risk. If you cannot live with that you are in the wrong business.

  • irmirm Member

    @sman holy shit, you're insufferable. just stop...

  • @sman said:

    Hmm.. alright. I won't waste my time here. Good luck!

  • @sman said:
    Did you try it? Please provide the results.

    How about, uhh, gee I dunno, learning SQL?

    Anyone half competent at the language will tell you that the query mentioned will do exactly what @severian claims it does.

    Stop arguing for the sake of arguing, several people did try it and were successful in getting access to unauthorized data.

    Just because it's not publicized does not mean it's not happening.

  • dnomdnom Member
    edited October 2013

    @sman this is the code that was publicly released: http://localhost.re/res/whmcs.py
    it has an "exploit" function where you can pass SQL statements. I assume anyone could have just passed "SELECT * tblclients" to get client info. anyone with SQL knowledge could have done anything (even write access) with the database easily.

  • @Wintereise said:

    Please provide one example. Surely if it is so easy and therefore must be happening then you can find at least one example somewhere in the world. I don't think this is an unreasonable request to counter your argument.

  • What example? I've so far nullrouted 6 people trying this on our (patched) WHMCS.

  • smansman Member
    edited October 2013

    @dnom said:
    sman this is the code that was publicly released: http://localhost.re/res/whmcs.py
    it has an "exploit" function where you can pass SQL statements. I assume anyone could have just passed "SELECT * tblclients" to get client info. anyone with SQL knowledge could have done anything (even write access) with the database easily.

    Yes I saw that. WHMCS is saying that the only thing they can do (not trivially either) is obtain the admin password hash. So who should I believe? WHMCS or you?

    I've done some php coding involving sql database access and manipulation. It's not something I do a lot of so I don't claim to be an expert which is why I defer to WHMCS's explanation.

  • smansman Member
    edited October 2013

    @Wintereise said:
    What example? I've so far nullrouted 6 people trying this on our (patched) WHMCS.

    I am seeing the same thing. All I will say about that is I am only seeing the admin hash attempts.

    I'm in the same boat as everyone else on this. Just trying to understand it and see what I can do better for risk management moving forward.

  • @sman said:
    I've done some php coding involving sql database access and manipulation. Have you? It's not something I do a lot of so I don't claim to be an expert which is why I defer to WHMCS's explanation.

    @sman I actually code to eat.
    I just don't have access to a vulnerable WHMCS so I can't easily test. But if you want to provide that for me and pay me a fee. I will happily prove it to you. :)

  • DewlanceVPSDewlanceVPS Member, Patron Provider

    After applying a patch your whmcs is safe from this exploit?

  • smansman Member
    edited October 2013

    @dnom said:
    I just don't have access to a vulnerable WHMCS so I can't easily test. But if you want to provide that for me and pay me a fee. I will happily prove it to you. :)

    I do have a honeypot. I can probably downgrade it to 5.2.7 for you. Just send the bill to [email protected]

  • @sman I assume you can downgrade? I never worked with WHMCS (except for being a client) before so I'm not sure.

  • The guys who are good enough to figure out more then that if it's even possible won't be pissing around going after joe blow hosting company. They are too busy trying to hack into banks and getting hundreds of thousands of credit card numbers.

    That's actually bullshit and statistics show that the majority of hacks are done against small businesses. Hackers are more likely to target small businesses because they're 'easy picking' since the average small business doesn't have the resources to implement sophisticated security techniques. The average WHMCS user would be a perfect example of that: someone with limited knowledge of security and programming compounding the problem by using an obfuscated script and relying on the software maker's word that the code is "safe".

    I've done some php coding involving sql database access and manipulation. Have you? I don't claim to be an expert which is why I defer to WHMCS's explanation.

    Accepting a company's public relations/salesman's explanation as the gospel truth is a lot like accepting a politician's explanation as the truth. :)

  • smansman Member
    edited October 2013

    @DomainBop said:

    What I mean is that the guys who are really good and make big money don't fart around with this minor league stuff. So yea the vast majority of hacking is done by script kiddies who aren't very good and mostly just do things like trying to delete databases and deface websites. They are young enough that they don't have to worry about any major consequences that daddy won't bail them out of.

    Not sure what you mean by the second statement. I'm assuming everyone here has done some coding. It's not like php is all that difficult or uncommon. Especially in combination with mysql.

    So no doubt you can say the same thing yes?

  • c0yc0y Member
    edited October 2013

    @sman said:
    Yes I saw that. WHMCS is saying that the only thing they can do (not trivially either) is obtain the admin password hash. So who should I believe? WHMCS or you?

    No they did not say that, l2read moron

    In the published exploit example, the scripted behavior is to retrieve the admin user password hashes

    The exploit script can be altered to execute ANY sql query...

  • MaouniqueMaounique Host Rep, Veteran

    @DomainBop said:
    That's actually bullshit and statistics show that the majority of hacks are done against small businesses. Hackers are more likely to target small businesses because they're 'easy picking' since the average small business doesn't have the resources to implement sophisticated security techniques

    Actually, there is a much more sinister reason for why the small ppl are targeted. That is the fact that law does not work for them they cannot make the police and FBI go after the perpetrators, those go after people hacking the big corporations or the FBI/NSA directly. Nobody cares about the little guys, except how to make them pay more taxes and how to bully them into giving up their constitutional rights and their customers.

  • dnomdnom Member
    edited October 2013

    @Frost said:
    The exploit script can be altered to execute ANY sql query...

    So @Frost, willing to pay the bill to prove? JK :D

    <3 @Maounique turning this thread to be about politics

  • MaouniqueMaounique Host Rep, Veteran

    @dnom said:
    <3 Maounique turning this thread to be about governments

    Has anyone here managed to get a successful prosecution of some hacking against them ? Did the police even listened to a complaint ?
    Instead we know about raids and seizing of equipment, even against the law or abusing it.
    Hackers target the little guys because it is safe. Hacking a bank is dangerous and you will not be able to spend the money even if you manage to get them, but gathering paypal accounts and stealing little money form each can work.

  • @Maounique I actually agree with your point.

  • serverianserverian Member
    edited October 2013

    @sman, here you go buddy. You made me get a dev license, download old WHMCS and install it and execute the SQL code and record it:

    The code executed is AES_ENCRYPT(1,1), firstname=(SELECT * FROM (SELECT GROUP_CONCAT(email,0x3a,lastname,0x3a,phonenumber) FROM tblclients) as x)#

    The WHMCS version is 5.2.3

  • mpkossenmpkossen Member
    edited October 2013

    @Frost said:
    If you want to be a moderator then don't go point fingers at stuff you don't like without knowing what happened besides that. Can't come back from a honeymoon and go play policeman in arguments you have 0 perspective on

    I did read back and I am aware of what was said in this thread. It's all there. And even if he said something that was "wrong" or you didn't agree with, there's simply no way to behave and respond to that.

    I realize it's not nice to be told you're wrong in public, but there's no reason to make this personal towards me because all I'm trying to do is to keep this place a bit decent. You telling people they're morons just because they may be wrong (regardless whether they are or not) is not helping!

  • DomainBopDomainBop Member
    edited October 2013

    @Maounique Has anyone here managed to get a successful prosecution of some hacking against them ? Did the police even listened to a complaint ?

    We had a site hacked and defaced in 2001 (the only time we've had a site hacked), filed a report with the FBI as did several other small businesses that were attacked (a few dozen sites were hacked by this person), and the hacker ended up spending a year in federal prison. His arrest and prison time though had almost nothing to do with his hacking small businesses and almost everything to do with the US government using the hacking as an excuse to persecute the hacker for his beliefs and try to stifle free speech.

    FYI, the FBI never contacted us after we made the initial complaint...they were obviously too busy with their witch hunt.

    the hacker: http://en.wikipedia.org/wiki/Sherman_Austin

    edited to add: the hack was done through a backdoor he'd hidden in a chat script he sold.

  • c0yc0y Member

    @mpkossen said:
    You telling people they're morons just because they may be wrong (regardless whether they are or not) is not helping!

    You're right, it's inappropiate to call ignorant people morons just because they have got proved wrong by 5 people and still don't believe it

  • smansman Member
    edited October 2013

    @serverian said:
    sman, here you go buddy. You made me get a dev license, download old WHMCS and install it and execute the SQL code and record it:

    The code executed is AES_ENCRYPT(1,1), firstname=(SELECT * FROM (SELECT GROUP_CONCAT(email,0x3a,lastname,0x3a,phonenumber) FROM tblclients) as x)#

    The WHMCS version is 5.2.3

    No argument from me as WHMCS says that is what this exploit can do. You said the exploit allows you to DROP the table. Show me that.

    I believe going to Settings>General Settings>Other>Locked Client Profile Fields and checking first/last name would take care of this but not sure. Would like to see that tested if you don't mind. Not sure if you need to also Disable "Allow client registration" without ordering but it does make them waste more time trying so sounds good to me.

  • wcypierrewcypierre Member
    edited October 2013

    @sman said:
    I believe going to Settings>General Settings>Other>Locked Client Profile Fields and checking first/last name would take care of this but not sure. Would like to see that tested if you don't mind. Not sure if you need to also Disable "Allow client registration" without ordering but it does make them waste more time trying so sounds good to me.

    As a matter of fact, SQL Injection does allow you to drop the table or even the whole database, or even read/write from/to a file to accessible directory "provided" that the mysql user that is associated with the whmcs has the permission to do so. Normally drop privileges are not granted to the mysql user to prevent it from doing something silly(like in this case, dropping the whole table or the whole database itself).


    Why the focus is given on extracting information from the database is because select privilege are usually granted(infact, almost all of the time, otherwise you won't be able to read anything such as client's hashed password for comparison during login and such) so it is given a higher importance as this is the problem that you'll see on the default setup. But if you're able to drop a table or database with the default setup then I have nothing to say(its either the db admin has accidentally granted the permission or a bug at mysql or you're using the root mysql user).


    I don't own a WHMCS license so I don't know what are the privileges that is given to the associated mysql user, but I believe that it won't grant the mysql user with drop privileges(for security purposes) so all is well.


    Source: http://dev.mysql.com/doc/refman/5.1/en/privileges-provided.html

Sign In or Register to comment.