Jump to content

Security breach?


swilders

Recommended Posts

Hello,

 

I've applied the last 2 security patches as soon as I received notification about them. This morning I found a new signup on our WHMCS install and the log shows the following:

 

Client Profile Modified - First Name: 'naksdnkas' to 'AES_ENCRYPT(1,1), firstname= (SELECT GROUP_CONCAT(id,0x3a,username,0x3a,email,0x3a,password SEPARATOR 0x2c20) FROM tbladmins)', Last Name: 'asdasdas' to '1', Company Name: 'asdasdasd' to '1', Address 1: 'asdasdasd' to '1', Address 2: 'asdasd' to '1', City: 'sadasd' to '1', State: 'Bath and North East Somerset' to '1', Postcode: '56 564' to '1', Country: 'GB' to 'US', Phone Number: '435345345' to '1', Default Payment Method: '' to ''

 

Have I anything to worry about or do the patches prevent this?

 

I have ensured all admins have changed their passwords to be on the safe side.

Link to comment
Share on other sites

  • WHMCS CEO

Hi Shaun,

 

In recent versions of WHMCS, a submission like this poses no risk at all. This specific submission value was addressed and blocked in the 5.2.9 update so providing you're running 5.2.9 or later there is nothing to worry about. You do not even need to reset passwords, the attempted attack will simply fail on current versions.

 

Matt

Link to comment
Share on other sites

Hi Shaun,

 

In recent versions of WHMCS, a submission like this poses no risk at all. This specific submission value was addressed and blocked in the 5.2.9 update so providing you're running 5.2.9 or later there is nothing to worry about. You do not even need to reset passwords, the attempted attack will simply fail on current versions.

 

Matt

 

 

What is being done about this problem overall? In one month there were 4 security problems. One of which was "Fixed" with another security breach. How can we feel safe using your product with exploits popping up all over the place. Are you guys getting an external security audit done? As this is completely ridiculous. Coming from a company your size and notoriety. Someone also tried this exploit on us last night. If I were you guys. I would ask localhost.re to remove those blog posts. So more people dont find it. As some people may not have updated in time. I'm worried about future bugs. Since it only took one guy a couple days to find major exploits in your code.

Link to comment
Share on other sites

Hello,

 

It's highly unlikely that it only took this individual a few days. It's more reasonable that he had a few and posted them in sequence intentionally causing a degree of panic. We are in the middle of performing internal auditing and reviewing new external auditors.

 

While I am happy to hear you guys are doing some heavy auditing. I don't think you completely answered him. Honestly how can you say he had those planned already, and posted them in order to start panic. I understand the last one.....for the invoices...he could have held onto that one. But you guys fixed an exploit with another exploit. Looks like you guys spit out a quick fix. And then it took him a mere 13 days to crack that.This is all according to the dates on his site. So unless hes a mind reader and knew exactly how you guys were going to fix you code. I don't believe that's possible that it was planned.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use & Guidelines and understand your posts will initially be pre-moderated