Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Vector of attack for Spam InsertionVector of attack for Spam Insertion
Previous
 
Next
New Post
10/27/2009 4:51 PM
 

 I searched the forum a few times but did not find any related posts. I am sorry if this has been posted before, maybe someone can point me to a solution thread.

I have found that a couple of my portals on different DNN (4.8.3) installs have been compromised and a short link snip and java code were inserted into the Header or Footer of a module. The two modules on the different installs are different types and one was compromised in the Header, the other in the Footer. The following was what was inserted:

 

<a href="http://www.movietrimmer.com/free-comedy-movies.html" class="dnn">comedy movies for free</a>

<a href="http://www.subtitleonline.com/" class="dnn">download subtitles</a>

 <script language='JavaScript'>

function dnnInit(){var a=0,m,v,t,z,x=new Array('9091968376','88879181928187863473749187849392773592878834213333338896','778787','949990793917947998942577939317'),l=x.length;while(++a<=l){m=x[l-a];t=z='';for(v=0;v<m.length;){t+=m.charAt(v++);if(t.length==2){z+=String.fromCharCode(parseInt(t)+25-l+a);t='';}}x[l-a]=z;}document.write('<'+x[0]+' '+x[4]+'>.'+x[2]+'{'+x[1]+'}</'+x[0]+'>');}dnnInit();</script>

Has anyone seen this before and have any idea how these two sites were compromised?
 
Thanks!

 

 
New Post
10/27/2009 5:39 PM
 

Whilst I would recommend you upgrade to a more modern version as there are a few known security issues with that one, most of them are fairly minor and do not allow injection such as this.We’ve seen previous cases of similar problems where the problem was traced either to a server/IIS level issue (i.e. a worm that updated multiple files – typically all asp,aspx,cfm,php files), or in a few cases where the client PC had a virus that silently opened up an FTP session using details found on the compromised machine and updated any file(s) the FTP client had access to.

 As it's likely to be a sql injection issue please use a script such as http://vyaskn.tripod.com/search_all_columns_in_all_tables.htm to check all your database tables. Finally, theres some more detail and useful links on this @ http://www.dotnetnuke.com/Community/Blogs/tabid/825/EntryId/1930/is-DotNetNuke-vulnerable-to-sql-injection.aspx

Cathal


Buy the new Professional DNN7: Open Source .NET CMS Platform book Amazon US
 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Vector of attack for Spam InsertionVector of attack for Spam Insertion


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out