Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Security Vulnerability?  Anyone else?Security Vulnerability? Anyone else?
Previous
 
Next
New Post
11/24/2009 6:57 PM
 

Tim,

the fact that another DNN site was attacked, does not imply it is a DNN vulnarablilty.

Hackers could use a vulnarablilty of your system (O/S, ftp or anything else) to gain access to the web server and use same method to modify the content. 

Please contact security at dotnetnuke dot com for assistance.


Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
11/24/2009 11:36 PM
 

I did email them (but haven't heard anything yet).  I had not seen your post prior to my earlier post, since my posts are moderated, they take a while to go up...

I understand their are other ways to get in, and am not saying that it couldn't have been another option, but the content left was DNN specific and in a DNN specific location.  Regardless of where the vulnerability was (DNN or OS or whatever), the person was attacking DNN specific sites (not to say he/she hasn't attacked non-DNN sites, but these specific attacks were DNN related).  Personally, I believe it was vulnerability in DNN or a specific module (Effority is what these Modules were embedded in), but Windows 2003 Server and SQL Server are also potential weaknesses (although the argument for them is diminished given the nature of the hacked content).

I am not trying to say there is a problem per se with DNN (I have been using it successfully on over 100 unique client websites for many years and am familiar with how it works and behaves).  I am just trying to 1) figure out if others have had a similar problem and 2) notify the community in general that there MAY be a vulnerability that is just starting to be exploited.  

 
New Post
11/25/2009 2:45 AM
 

Tim, according to the DNN security policy the security team will analyse any possible vulnerability and take care of it as soon and quick as possible. 


Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
11/25/2009 2:59 AM
 

Tim, I've already replied to your email which we recevied 10 hours ago (8 of which I was asleep for :) )

As you've been discussing this in public and to calm the fears of anyone who's read this thread, I'll post a few comments.

Sebastian is correct in that seeing the same injected string on 2 sites is no indication of an issue being DotNetNuke specific. In fact many times when we get similar reports, some searching reveals the injected string across classic asp apps, php apps, other asp.net apps and dotnetnuke. In this case I'd suggest the common link may be a 3rd party module used in both sites.

The most common way for this to occur is via SQL Injection. Whilst DotNetNuke is not vulnerable to this, it's often caused by a legacy application on the same server (old classic asp applications seem to be a common cause), or a problem with a 3rd party module (e.g. some 3rd party modules allow you to supply custom sql scripts to generate reports, and some of them are susceptible to sql injection). I blogged a little on this @ http://www.dotnetnuke.com/Community/Blogs/tabid/825/EntryId/1930/is-DotNetNu
ke-vulnerable-to-sql-injection.aspx , which provides some further information and links to tools that can lock down your server and help you identify the cause of the issue.
 
As you’ve found a 2nd site with the same injection string, I’d suggest that it might be a good idea to compare modules to see what 3rd party modules you have in common as thats the likely source of the exploit.
 
In general I have found UrlScan 3.0 or above to be a very effective protection against these attacks - http://www.microsoft.com/downloads/details.aspx?FamilyId=EE41818F-3363-4E24-9940-321603531989&displaylang=en . Whilst it doesn't fix the root cause of many of these problems it does stop the attacks by rejecting the sql injection strings.
 
I'd also recommend you read http://misfitgeek.com/blog/tools-to-block-eradicate-sql-injection/ , particularly if you're developing your own custom modules.
 
Finally, I find this script to be very useful in identifying the database tables that have content (i.e. trlink.net) injected into them. http://vyaskn.tripod.com/search_all_columns_in_all_tables.htm

Buy the new Professional DNN7: Open Source .NET CMS Platform book Amazon US
 
New Post
1/11/2010 7:37 PM
 

 OK, well, we cleaned it up last time, but now it has happened again, and we have found a multitude of other DNN and ONLY DNN sites that have also been hacked.  These include universities, cities, a UN site, non-profits, and many others. All of the following sites have been hacked (there are more, but I got tired of copying).: 

 

**********  REMOVED APPROX 25 URLS FOR SECURITY PURPOSES ***************

 

 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Security Vulnerability?  Anyone else?Security Vulnerability? Anyone else?


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out