Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeOur CommunityOur CommunityGeneral Discuss...General Discuss...Hackers reporting they are compromising sites that are using DNNHackers reporting they are compromising sites that are using DNN
Previous
 
Next
New Post
5/19/2009 9:35 PM
 

I had a quick search through the forums for discussions about this and general hacking of DNN - but there doen't seem to be alot - which I guess is a good thing.

This post is more to alert people that this is happening and hopefully somone can figure out how and stop it.

It looks like there may be some kind of vulnerability or exploit that hackers are using against DNN sites.  The web site www.zone-h.org is used to report sites that have been hacked or tampered with.  If you go to the archive and select the [Enable Filters] at the top of the page and then enter "Fribo" in the attacker field and then select Apply you'll see alist of sites this person has compromised.  Most of the sites reported are DNN and I'm basing this on the fact that the url consists of the following... http://www.domainname/portals/0/....

Here's a quick link to Fribo's list ... http://www.zone-h.org/archive/defacer=Fribo

It looks like the only damage been done is the upload of a txt file, and not a deface of the sites.  Whether this is because thats all they can do or they're just firing a warning shot I have no idea.  Regardless of what they are doing this is unauthorised access so it should be treated seriously.

Fribo is not the only one doing this.  Search for "Persian Boys Hacking Team" (this link will take you to a list of their sites http://www.zone-h.org/archive/defacer=Persian%20Boys%20Hacking%20Team )

Thanks for reading and responding (for those that do)

 

 

 
New Post
5/20/2009 3:07 AM
 

At least the sites on Linux aren't DNN sites, however I assume the hacker is abusing a known vulnarability in previous versions, which has been fixed in DNN 4.9.x, please check the security bulletins. It is always advisiable to upgrade to latest production version (4.9.3 atm).

If you are suspecting your site to be victim of a hacker, please contact security @ dotnetnuke.com.


Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
5/20/2009 5:55 AM
 

These hackers are exploiting a known bug that was patched over a year ago in DNN 4.8.3.  You can read more about the issue on Cathal's latest blog.

These exploits highlight the need for people to make sure they are monitoring the security bulletins and to keep their systems up to date. 


Joe Brinkman
DNN Corp.
 
New Post
5/20/2009 9:26 AM
 

Thanks for letting us know, as Joe mentioned we're aware of these issues already, and they rely on exploiting a bug we fixed over a year ago.

The issue with the .txt files was fixed in the 4.8.3 release (dated May 23 2008). You can read the original security bulletin @ http://www.dotnetnuke.com/News/SecurityPolicy/SecurityBulletinno17/tabid/1162/Default.aspx . The scope of the attack is limited by the safe file extension string, so typically the hackers can only upload txt files, or overwrite existing images (jpg/gif). AN upgrade to a version 4.8.3 or higher (ideally 4.9.3) will resolve this issue.

Please note, we have an email alias set up at security@dotnetnuke.com , which is the best way to let us know about any potential issues.

Cathal

 


Buy the new Professional DNN7: Open Source .NET CMS Platform book Amazon US
 
New Post
5/20/2009 9:53 AM
 

 Hi Cathal,

I sent an email to Security@ this morning but I haven't received any response.  Can you confirm that the message was received?

 

 
Previous
 
Next
HomeHomeOur CommunityOur CommunityGeneral Discuss...General Discuss...Hackers reporting they are compromising sites that are using DNNHackers reporting they are compromising sites that are using DNN


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out