kingsleymensah
Retired Forum Member-
Posts
62 -
Joined
-
Last visited
About kingsleymensah

Recent Profile Visitors
1613 profile views
kingsleymensah's Achievements
Member (2/3)
6
Reputation
-
SamiKhan786 started following kingsleymensah
-
Hello, i created a product group where i have assigned my new reseller packages i created to ( https://prnt.sc/utf4io ) I don't know why but they are not visible to existing clients ( https://prnt.sc/utf8he ) but only visible to new signups.( https://prnt.sc/utfa3s) where did i go wrong??
-
WHMCS cannot find packages created in WHM
kingsleymensah replied to kingsleymensah's topic in Using WHMCS
Ok, so i solved this by switching the server group option to "Add to the least full server" https://prnt.sc/uszi4y Now a new issue has come up... I was able to fetch and assign the packages in WHMCS alright but now the product group does not display the reseller products to existing clients with existing products already https://prnt.sc/uszm2k P.S these are reseller packages i created -
Hello, I added a new server to my WHMS and test connection was successful !. I got to module section of setting up product but it cannot find any of the packages i created https://prnt.sc/uswnif The error message says "No server found" I actually added the server to a group too
-
Vulnerability report (click jacking)
kingsleymensah replied to kingsleymensah's topic in General Discussion
ahhh..... thanks man. On it now! -
Hi guys, i received an email from someone claiming to be a pentester and he says he found a vulnerability in my WHMCS Here is what he sent: "I am a security researcher and I found this vulnerability in your website https://kingscel.com/ Bug type : UI Redress Impact : Phishing (account compromise) Description : Click jacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both. Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker. POC: <html> <head>UI REDRESSING</head> <body> <h1>WEBSITE IS VULNERABLE TO UI REDRESSING</h1> <iframe width=100% height=80% src="https://mydomain/whmcs/clientarea.php"></iframe> </body> <html> Impact: Any User can be lured in to click on whats look like a functionality of the website but is actually an attackers frame button containing some malicious javascript code or redirection code leading the user to a vulnerable site . And as the vulnerability persists even after the user is logged in which makes it even more sever. Suggested Fix: Add an iframe destroyer in the page headers. Please let me know if any more info needed ! Waiting for your reply and hopefully a bug bounty for responsibly reporting the issue ... Note: i am attaching a screenshot as proof of concept waiting for your response." Note: he just took a screenshot of my client area login page Should i be concerned?
-
WHMCS break after upgrading server to php 7.3
kingsleymensah replied to kingsleymensah's topic in Troubleshooting Issues
Yes, i do have options so now set it back to 7.2. -
WHMCS break after upgrading server to php 7.3
kingsleymensah replied to kingsleymensah's topic in Troubleshooting Issues
Well i just did but no errors displayed. could it be from the custom payment gateway module?
