slim Posted October 19, 2013 Share Posted October 19, 2013 After the hacking of the WHMCS site a few months ago, WHMCS team should have spent all their time on security - To ensure that their own internal systems were secure and that their customers information was secure. They failed, and WHMCS was hacked with a criticle security hole in 5.2.7 (and other earlier versions). Now, less than a month later, the exact same thing has happened AGAIN - Another massive security hole has been announced by a third party. This is simply unacceptable. WHMCS should have spent the last month looking through the code, ensuring it was secure and issuing patches as they found problems. If they looked at their own code, they would have found this issue before it was announceed by localhost. Instead, we have reactionary responces - They wait for localhost to announce a problem, then they fix it. THIS IS NOT GOOD ENOUGH BY ANY ONES STANDARD. Charge double for WHMCS - I could care less. If its secure, im willing to pay. Im not however willing to stand by and watch my business goto **************** because you couldnt be bothered to secure your code. This is bullshit and needs to be sorted. Link to comment Share on other sites More sharing options...
zoilodiaz Posted October 19, 2013 Share Posted October 19, 2013 After the hacking of the WHMCS site a few months ago, WHMCS team should have spent all their time on security - To ensure that their own internal systems were secure and that their customers information was secure. They failed, and WHMCS was hacked with a criticle security hole in 5.2.7 (and other earlier versions). Now, less than a month later, the exact same thing has happened AGAIN - Another massive security hole has been announced by a third party. This is simply unacceptable. WHMCS should have spent the last month looking through the code, ensuring it was secure and issuing patches as they found problems. If they looked at their own code, they would have found this issue before it was announceed by localhost. Instead, we have reactionary responces - They wait for localhost to announce a problem, then they fix it. THIS IS NOT GOOD ENOUGH BY ANY ONES STANDARD. Charge double for WHMCS - I could care less. If its secure, im willing to pay. Im not however willing to stand by and watch my business goto **************** because you couldnt be bothered to secure your code. This is bullshit and needs to be sorted. Completed agree, WHMCS is playing with us, these is not a game and we are the only affected. WHCMS is the most hacked billing system in the history. Link to comment Share on other sites More sharing options...
Damo Posted October 19, 2013 Share Posted October 19, 2013 In the history? Get a grip! If you're that unhappy then vote with your feet and find another system. No software application is fool proof, regardless of the types of exploits found, but when identified they are addressed. I would like to whmcs be more active in their communication though. And I suspect that they'll be making an announcement about recent events. For the present time we are staying with whmcs. Link to comment Share on other sites More sharing options...
twhiting9275 Posted October 19, 2013 Share Posted October 19, 2013 No software application is fool proof, regardless of the types of exploits found, but when identified they are addressed. No, they're not. Not properly Writing a 'hack' to address serious security concerns is not properly addressing the situation. It's more like putting a band-aid on a gaping bullet wound. To add to this, the amount of time it took to 'address' this situation is deplorable. These individuals fail to realize that they kept sites down for the entire time this was done. If you didn't shut your site down, disabling access to it, then you have no place in the industry. THAT is just how serious this is. The fact of the matter is that this is happening far too often, and I can guarantee we WILL see more of this, until the code is professionally audited and fixed. The problem? Some of this garbage has been in there since day 1, years ago. I suspect that they'll be making an announcement about recent events. Theyalways do, and they always say some garbage about We're sorry about blah blah blah blah blah It's past the time for apologies. Matt and the cPanel crew need to focus on actually providing a proper, stable, secure product if they intend to keep themselves on top of the market Link to comment Share on other sites More sharing options...
DontForget Posted October 19, 2013 Share Posted October 19, 2013 Nice, now will come Infopro and expect the thread to be closed. This is how they fix the bugs. Link to comment Share on other sites More sharing options...
bear Posted October 19, 2013 Share Posted October 19, 2013 This is how they fix the bugs. Moderation and fixing bugs are not related. Threads get closed if they're rude and antagonistic. We're all angry and frustrated here, but if you remain civil, the thread should remain open. Discuss, don't attack. Link to comment Share on other sites More sharing options...
alinford Posted October 19, 2013 Share Posted October 19, 2013 Still trying to figure out the root for the word 'discusting' Link to comment Share on other sites More sharing options...
bear Posted October 19, 2013 Share Posted October 19, 2013 Odds are they're not a native English speaker. I'd venture a guess in saying you'd have at least as many spelling issues in his native language. Link to comment Share on other sites More sharing options...
alinford Posted October 19, 2013 Share Posted October 19, 2013 Odds are they're not a native English speaker. I'd venture a guess in saying you'd have at least as many spelling issues in his native language. Ohhhhhh. Got it. I assumed from the posts that he/she/it was infallible. I will stop assuming I know everything, and will try to handle myself a little better on this forum. Thanks for checking me. Link to comment Share on other sites More sharing options...
slim Posted October 19, 2013 Author Share Posted October 19, 2013 I’m Australian - and I was mighty pissed when I read my business email at about 10pm at night after about 20 bourbons and found that there was ANOTHER critical issue and that my servers were sitting out there potentially unprotected for hours and hours. So, spelling went out the window. WHMCS know the localhost crew have the source code - so they are going to release exploit after exploit after exploit unless WHMCS fix the issues proactively. Localhost probably has his next exploit ready to go in 3 weeks’ time. Link to comment Share on other sites More sharing options...
bear Posted October 19, 2013 Share Posted October 19, 2013 I’m Australian I've been wrong before. after about 20 bourbons Have to say, based on that you did great. I'd be spelling with my forehead at that point. Link to comment Share on other sites More sharing options...
mlew2 Posted October 19, 2013 Share Posted October 19, 2013 At times like this I think spelling goes out the window for just about anybody, we got his/her point and that is all that counts in my eyes anyways After that number of drinks I would be writing backwards I think......if at all Link to comment Share on other sites More sharing options...
panacheweb Posted October 20, 2013 Share Posted October 20, 2013 I’m Australian - and I was mighty pissed when I read my business email at about 10pm at night after about 20 bourbons and found that there was ANOTHER critical issue and that my servers were sitting out there potentially unprotected for hours and hours. So, spelling went out the window. WHMCS know the localhost crew have the source code - so they are going to release exploit after exploit after exploit unless WHMCS fix the issues proactively. Localhost probably has his next exploit ready to go in 3 weeks’ time. I would suspect they are going to stepping up their attacks on whmcs.. at this point I think it's time whmcs did get an audit done.. I'm sure cpanel is looking at the raw code and asking themselves WTF.. At this point I'm considering my options even if it costs me more money... I'm sure localhost has the decryption software that is out there and has already decoded the updates and are scratching their heads and wondering to themselves what the crap. Probably while having a good laugh... so my question is.. how is it the update that was released never included a fix to the dbfunctions.php file that was talked about in the hack... but a bunch of other files were fixed... if anyone has a good answer... am I missing something here?? If security was a concern of whmcs.. they would stop all feature requests.. and go back over their core code and fix it properly. How hard is it to really fix things properly??? Link to comment Share on other sites More sharing options...
Alex - Arvixe Posted October 20, 2013 Share Posted October 20, 2013 In the history? Get a grip! If you're that unhappy then vote with your feet and find another system. No software application is fool proof, regardless of the types of exploits found, but when identified they are addressed. I would like to whmcs be more active in their communication though. And I suspect that they'll be making an announcement about recent events. For the present time we are staying with whmcs. In most cases I'd agree but with WHMCS it seems to be one after the one non-stop. They really should invest into a 3rd party security audit and begin with patching anything that comes up. At the same time I do give WHMCS a big thumbs up for the very quick patches to any critical security issues that do go public. Link to comment Share on other sites More sharing options...
AffordableDomainsCanada Posted October 20, 2013 Share Posted October 20, 2013 Less trade shows and more support, and fixes. All this money being spent on going to trade shows, yet we cant get a stable and secure product in which we paid for! Im frustrated with the lack of support regarding the iWHMCS addon. What a rip off, havent been able to use it cause io7 and iWHMCS just crashes.. Lets get this stuff fixed!!! Link to comment Share on other sites More sharing options...
Walter Blanco Posted October 20, 2013 Share Posted October 20, 2013 I’m Australian - and I was mighty pissed when I read my business email at about 10pm at night after about 20 bourbons and found that there was ANOTHER critical issue and that my servers were sitting out there potentially unprotected for hours and hours. So, spelling went out the window. WHMCS know the localhost crew have the source code - so they are going to release exploit after exploit after exploit unless WHMCS fix the issues proactively. Localhost probably has his next exploit ready to go in 3 weeks’ time. everybody has the source code. It took me 5 minutes to locate and download the full source code for 5.2.7 and also some ioncube decoders, just google it. It's not my intention to promote piracy, it's already available, at this time letting legitimate license owners know there is an unencoded version out there might not affect whmcs sales, but will bring more eyes to the code, there are a lot of naughty eyes on the code, let's add some "good guys" to the equation, searching for holes and reporting them to whmcs instead of exploting them and damaging business Link to comment Share on other sites More sharing options...
vec Posted October 20, 2013 Share Posted October 20, 2013 maybe if you did not update to the ios7 junk you would have not had to worry... Link to comment Share on other sites More sharing options...
slim Posted October 20, 2013 Author Share Posted October 20, 2013 All I’m saying is that the bad guys have the code - If there are holes in it, they are going to publish exploits. They have proven this twice in a month now. WHMCS has two choices… 1. Sit down and go through their own code and identify the obvious issues and release patches - in a hurry. 2. Do nothing and have more clients get hacked, more of us having sleepless nights etc. For one of my businesses I only swapped over from MB4 -> WHMCS a month ago after years of procrastination.. It’s been a nightmare ever since. Link to comment Share on other sites More sharing options...
innovot Posted October 21, 2013 Share Posted October 21, 2013 Are the exploits coming through the front-facing code or the admin area ? Link to comment Share on other sites More sharing options...
slim Posted October 21, 2013 Author Share Posted October 21, 2013 Front facing area. Link to comment Share on other sites More sharing options...
WorldWideWebDev Posted October 21, 2013 Share Posted October 21, 2013 (edited) Here's my Cents worth, Not ten.. Everyone here seems to an extent nonchalant and blasé about these security risks. Damo "If you're that unhappy then vote with your feet and find another system" its not always that easy. And if you know of one thats fantastic, please let us know.. I move on. WHMCS patches seem to have been knee jerk reactions all along. To think that some of us have critical business information, Credit details, domain passwords, hosting information and passwords, pay pal info and personal client details. Who here is angry about this? I sure am and everyone should be. How can any of us be to any extent accepting that this information, details, phone numbers whatever can get out? Wake up, this is serious stuff. And ill tell you what, if my host got hacked and leaked my information out, there would be some serious repercussions. Now tell me, how many people on this forum are here to play with a stupid failing WHMCS who don't care and on the other hand, how many are running legitimate business who thought they had a good product and have been shocked, scared and let down? I'd guess the blasé ones are here for the fun and the angry ones have something to lose. How many people here actually feel safe?? That should be the question and how many of your customers are safe? If only one of these stupid hackers gets in to a small business and defaces, scams email and clocks up some expenses against Registrars and ourselves , who pays? THERE IS A LOT MORE AT STAKE HERE than some people wish to admit. If banks cant get their **************** together with all the millions they spend, what hope have we?The hackers are only going to get better at what they do, the situation is only going to get worse. Wanna bet on that? Edited October 21, 2013 by WHMCS TedX Removed vulgarities. Link to comment Share on other sites More sharing options...
vec Posted October 21, 2013 Share Posted October 21, 2013 if you people put into your OWN business the amount of bitching you do about WHMCS you would be rich.... Link to comment Share on other sites More sharing options...
slim Posted October 21, 2013 Author Share Posted October 21, 2013 Looks like we have another patch.. Maybe they are listening finally Link to comment Share on other sites More sharing options...
alinford Posted October 21, 2013 Share Posted October 21, 2013 Looks like we have another patch.. Maybe they are listening finally Where are you seeing another patch? Link to comment Share on other sites More sharing options...
RFEHosting Posted October 21, 2013 Share Posted October 21, 2013 Where are you seeing another patch? http://blog.whmcs.com/ https://twitter.com/whmcs Link to comment Share on other sites More sharing options...
Recommended Posts