WorldWideWebDev Posted October 15, 2013 Author Share Posted October 15, 2013 That is really strange. I think you need to check the logs and verify whats happened and alert support. ASAP.. 0 Quote Link to comment Share on other sites More sharing options...
Walter Blanco Posted October 16, 2013 Share Posted October 16, 2013 Have you consider to try the exploit yourself in your own site? of course doing a backup first. Testing yourself would be the best way to know if you are still vulnerable, exploit is easy to find. 0 Quote Link to comment Share on other sites More sharing options...
neilstudy Posted October 16, 2013 Share Posted October 16, 2013 You mention: I got an sms from my alert telling me an admin had logged in from a non whitelisted IP.. Read on. Anthony Molina. Have you tried locking your admin down to ips in the .htaccess file or setting a HTPASSWD to the admin directory. 0 Quote Link to comment Share on other sites More sharing options...
WorldWideWebDev Posted October 17, 2013 Author Share Posted October 17, 2013 Hi neilstudy. no i haven't done what you mentioned. Where can i get info about doing that. That seems like one way of locking it up.. 0 Quote Link to comment Share on other sites More sharing options...
Infopro Posted October 17, 2013 Share Posted October 17, 2013 Hi neilstudy. no i haven't done what you mentioned. Where can i get info about doing that. That seems like one way of locking it up.. There's a link to "recommended further security steps" posted in the latest article on the blog: http://blog.whmcs.com/?t=79527 That link takes you to the WHMCS Documentation: http://docs.whmcs.com/Further_Security_Steps 0 Quote Link to comment Share on other sites More sharing options...
innovot Posted October 17, 2013 Share Posted October 17, 2013 If you control your own server you could place HAProxy in-front of WHMCS and use an ACL like this: acl WHMCS_Admin url_dir -i /admin acl ViaINNOVOT src 1.2.3.4 http-request deny if WHMCS_Admin !ViaINNOVOT 0 Quote Link to comment Share on other sites More sharing options...
Walter Blanco Posted October 17, 2013 Share Posted October 17, 2013 If you control your own server you could place HAProxy in-front of WHMCS and use an ACL like this: acl WHMCS_Admin url_dir -i /admin acl ViaINNOVOT src 1.2.3.4 http-request deny if WHMCS_Admin !ViaINNOVOT No need to install ha-proxy in .htaccess order deny,allow deny from all allow from 1.2.3.4 0 Quote Link to comment Share on other sites More sharing options...
epretorious Posted October 17, 2013 Share Posted October 17, 2013 (edited) Have you tried locking your admin down to ips in the .htaccess file or setting a HTPASSWD to the admin directory. I've restricted access to the WHMCS admin directory from Day #1. It's a nice bit of peace of mind to have. BTW: I highly recommend using MD5 Digest authentication method over Basic Authentication. There used to be a very good tutorial on mod_auth & mod_auth_digest available on the UCB Open Computing Facility Wiki but it's currently unavailable. Try this one from Widexl instead: Basic Authentication allows the use restrict access by looking up users in plain text password files. This is not a really secure password system, because the username and password are sent as plain text true the Internet. And the passwords in the password file are crypt in basic Unix crypt what not so difficult to crack. But it's still the most common password protecting on the internet. MD5 Digest authentication provides a more secure password system than Basic authentication, but only works with supporting browsers. HTH, Edited October 17, 2013 by epretorious 0 Quote Link to comment Share on other sites More sharing options...
innovot Posted October 17, 2013 Share Posted October 17, 2013 No need to install ha-proxy in .htaccess order deny,allow deny from all allow from 1.2.3.4 Excellent. Well at least the potential hacker has made it to your Apache instance. No flames, but am sure it would be better to neautralise as close to your perimeter as possible. 0 Quote Link to comment Share on other sites More sharing options...
Walter Blanco Posted October 17, 2013 Share Posted October 17, 2013 Excellent. Well at least the potential hacker has made it to your Apache instance. No flames, but am sure it would be better to neautralise as close to your perimeter as possible. So, you say you don't want to block the IP in Apache even if you can. If for any reason attacker can connect to apache eluding ha-proxy, then you have no measure against him. I don't see a problem with users (all users are potential hackers) connecting to Apache instances, this business is all about it , the real problem is about software than can be exploited, and whmcs history is prolific in attacks. The worst thing is the OP said that attacker got his md5 pass that was changed after it was patched, and nobody is focusing on that. That is a SQL injection, check the exploit, this has nothing to do with executing arbitrary php code on victim's server, if it's true that whmcs is still vulnerable AFTER the patch then everybody here is at risk. 0 Quote Link to comment Share on other sites More sharing options...
bear Posted October 17, 2013 Share Posted October 17, 2013 The worst thing is the OP said that attacker got his md5 pass that was changed after it was patched, and nobody is focusing on that.It was suggested he was backdoored at the time of the first issue. No one here has access to check that, so without someone confirming it was the same thing, that's what I'm assuming. If it was fully patched and everything freshly uploaded, with no files left anywhere in his entire site and no suspect email forwards and so on, that's something else. I'd be willing to bet it was something left over, personally. If not, there would likely be more reports. His is the only one I've seen, anywhere, that states they were hit after patching. if it's true that whmcs is still vulnerable AFTER the patch then everybody here is at risk. I strongly doubt that's the case here. 0 Quote Link to comment Share on other sites More sharing options...
Walter Blanco Posted October 18, 2013 Share Posted October 18, 2013 It was suggested he was backdoored at the time of the first issue. No one here has access to check that, so without someone confirming it was the same thing, that's what I'm assuming. If it was fully patched and everything freshly uploaded, with no files left anywhere in his entire site and no suspect email forwards and so on, that's something else. I'd be willing to bet it was something left over, personally. If not, there would likely be more reports. His is the only one I've seen, anywhere, that states they were hit after patching. I strongly doubt that's the case here. but the SQL injection attack only gets information from database, it doesn't execute arbitrary php code on the server, without that, how could a backdoor be introduced with sql injection? 0 Quote Link to comment Share on other sites More sharing options...
bear Posted October 18, 2013 Share Posted October 18, 2013 but the SQL injection attack only gets information from database, it doesn't execute arbitrary php code on the server, without that, how could a backdoor be introduced with sql injection? That's just the most visible action they take; and it leaves an easily identifiable trace. This flaw trusted data that included that line about "AES", so things were passed that included it, and the user details change was not the only method they'd tried and apparently succeeded in using. Password change was one I recall reading. I saw another report of someone that had files uploaded (which probably included shell scripts), another that had an admin account compromised or created and still others that had data altered in the database. An sql injection is a way into the database, and not just to pull data; it may also be possible to add some. The most commonly reported attack included a partial dump of some data, but that doesn't mean it was the only attack. It was just the easiest to spot. 0 Quote Link to comment Share on other sites More sharing options...
Mark_J Posted October 18, 2013 Share Posted October 18, 2013 if it's true that whmcs is still vulnerable AFTER the patch then everybody here is at risk. <snip> I strongly doubt that's the case here. Isn't there another new vulnerability that is currently being investigated? http://www.webhostingtalk.com/showpost.php?p=8880279&postcount=4 http://www.webhostingtalk.com/showthread.php?t=1309491&page=14 0 Quote Link to comment Share on other sites More sharing options...
bear Posted October 18, 2013 Share Posted October 18, 2013 Looks that way, yes. Following that with great interest. 0 Quote Link to comment Share on other sites More sharing options...
WorldWideWebDev Posted October 18, 2013 Author Share Posted October 18, 2013 I like his styles and a prayer to boot.. [TABLE=width: 100%] [TR] [TD]psalm91 Web Hosting Guru [/TD] [/TR] [/TABLE] [TABLE=class: tborder, width: 100%, align: center] [TR] [TD=class: alt2, bgcolor: #FAFAFA][TABLE=width: 100%] [TR] [TD][/TD] [TD=width: 100%]Screen capture this ! __________________ Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months.Sancte Michael Archangele, defende nos in proelio, contra nequitiam et insidias diaboli esto praesidium. Imperet illi Deus, supplices deprecamur: tuque, Princeps militiae coelestis, Satanam aliosque spiritus malignos, qui ad perditionem animarum pervagantur in mundo, divina virtute, in infernum detrude. Amen [/TD] [TD][/TD] [/TR] [/TABLE] [/TD] [/TR] [TR] [TD=class: alt1, bgcolor: #EFEFEF][/TD] [/TR] [/TABLE] 0 Quote Link to comment Share on other sites More sharing options...
Walter Blanco Posted October 18, 2013 Share Posted October 18, 2013 That's just the most visible action they take; and it leaves an easily identifiable trace. This flaw trusted data that included that line about "AES", so things were passed that included it, and the user details change was not the only method they'd tried and apparently succeeded in using. Password change was one I recall reading. I saw another report of someone that had files uploaded (which probably included shell scripts), another that had an admin account compromised or created and still others that had data altered in the database. An sql injection is a way into the database, and not just to pull data; it may also be possible to add some. The most commonly reported attack included a partial dump of some data, but that doesn't mean it was the only attack. It was just the easiest to spot. sql injection only gets or modifies database, it doesn't execute php code. exploit is easy to find, download it and check what it does, it doesn't upload anything 0 Quote Link to comment Share on other sites More sharing options...
bear Posted October 18, 2013 Share Posted October 18, 2013 (edited) sql injection only gets or modifies database, it doesn't execute php code.It can be used for a lot of different things. If you think you're safe because it "only" does the above, you're not. Go read the exploit page. This is on it: "This opens up a lot of other holes, for example we can write to /configuration.php whatever we want (PHP code included)" exploit is easy to find, download it and check what it does, it doesn't upload anything What makes you think that's the only exploit code/script out there? I'd bet it's not. Edited October 18, 2013 by bear 0 Quote Link to comment Share on other sites More sharing options...
PWPH Posted October 19, 2013 Share Posted October 19, 2013 (edited) Another security issue... WHMCS needs to do a security audit big time! EDIT: Did forum passwords just get reset? I got an email saying mine has been reset... Edited October 19, 2013 by PWPH 0 Quote Link to comment Share on other sites More sharing options...
WorldWideWebDev Posted October 19, 2013 Author Share Posted October 19, 2013 Mine did not.. Maybe someone tried something? 0 Quote Link to comment Share on other sites More sharing options...
WorldWideWebDev Posted October 19, 2013 Author Share Posted October 19, 2013 just got the email. WHMCS has released new patches for the 5.2 and 5.1 minor releases. These updates provide targeted changes to address security concerns with the WHMCS product. You are highly encouraged to update immediately. 0 Quote Link to comment Share on other sites More sharing options...
zoilodiaz Posted October 19, 2013 Share Posted October 19, 2013 just got the email. WHMCS has released new patches for the 5.2 and 5.1 minor releases. These updates provide targeted changes to address security concerns with the WHMCS product. You are highly encouraged to update immediately. Sorry to say but WHMCS su**** 0 Quote Link to comment Share on other sites More sharing options...
WorldWideWebDev Posted October 19, 2013 Author Share Posted October 19, 2013 I sympathise and admit i dont feel to secure at the moment, and after investing years in time, money on add-ons and getting it the way i liked i am now faced with the prospect of WTF do i do? Not a good feeling..... 0 Quote Link to comment Share on other sites More sharing options...
Infopro Posted October 19, 2013 Share Posted October 19, 2013 Another security issue... WHMCS needs to do a security audit big time! EDIT: Did forum passwords just get reset? I got an email saying mine has been reset... Please send that email to me via private message here on the forums, I'd like to see it if you don't mind. Thanks 0 Quote Link to comment Share on other sites More sharing options...
PWPH Posted October 19, 2013 Share Posted October 19, 2013 Please send that email to me via private message here on the forums, I'd like to see it if you don't mind. Email sent. 0 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.