Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Security Vulnerability?  Anyone else?Security Vulnerability? Anyone else?
Previous
 
Next
New Post
1/11/2010 8:03 PM
 

 Oh, two three things to note:

1. I am running HP's scrawlr -- got there from a link you gave me Cathal -- that is supossed to show SQL Injection vulnerabilities.  I will let you know if it comes up with an individual module via email and not via forum.

2. I am also sending this via email -- my reason to post in the forum is not to cause panic, but rather to cause legitimate concern by users.  As with any set of users, it is always when a multitude of users note similar problems that it causes things to change.  

3. I am not trying to lay blame anywhere. Everything has problems, it is only with time and tough experience that those problems are brought to the surface and resolved.  

Anyway, I do appreciate DNN team and the product they continue to make better.

Thanks

Tim

 
New Post
1/11/2010 8:16 PM
 

HP's scrawlr tool has a limited number of pages it will search, so it timed out after scanning with no malicious results, about 2200 pages (it crawled 12k).

I ran it on a couple of the other sites that were smaller, however, and it completed its analysis with zero malicious results.

btw, this is where we got the idea to use scrawlr, under the "Suggested Actions" http://www.microsoft.com/technet/security/advisory/954462.mspx

 

 
New Post
1/11/2010 9:21 PM
 
Tim Hardin wrote:

my reason to post in the forum is not to cause panic, but rather to cause legitimate concern by users.  As with any set of users, it is always when a multitude of users note similar problems that it causes things to change.  

Tim, I understand where you are coming from.  But we have a very long history of dealing with security issues in a way which is frequently praised (largely thanks to Cathal's personal responsiveness).  We hope you'll continue to work with us in a discreet manner until everything is resolved.  It is likely that any DotNetNuke hacker would also (anonymously) surf our forums for information, so posting your own vulnerabilities is certainly not a best practice.  Your cooperation would be appreciated.

Thank you!


Scott Willhite, Co-Founder DNN

"It is only with the heart that one can see rightly... what is essential is invisible to the eye. "
~ Antoine de Saint-Exupéry

 
New Post
1/12/2010 12:03 AM
 

 Scott -- I agree with you that we don't want to help hackers trolling this (or other) sites.  That said, I don't believe anything I have posted has shown any specifics of where the vulnerability (assuming it exists) might be.  

Also, if DNN felt that something was too explicit, I would have no problem with DNN taking it down (you do moderate this site :)).

I do feel, though, that when the community can openly discuss what is going on it has great benefit to both the software corp (DNN) and the users.  I like the forum on your site because it does enable you to allow open discussion with great feedback from all the experts.  

In all honesty, this vulnerability scares me.  Not only does it appear that someone is able to write to the module setting (perhaps via SQL insertion), but that from what I could collect via google searches, no one has posted a "how to fix it" article.  

I really don't want to be a pest, I am just trying to point out what I, and my client, see as a priority to resolve quickly.

Thanks

Tim

 
New Post
1/12/2010 1:02 PM
 

Tim,

Naturally we’ve interested in any information you can give us regarding potential vulnerabilities, but it's always better to email the security@dotnetnuke.com address. Open discussion of security issues (aside from being against forum policy), typically benefits no-one except potential hackers. If we can isolate an issue, and either prepare a core release that fixes it, or contact a vendor and help them with a fix, this minimises the windows between when the vulnerability details are known and when fixes are available.
 
I've already replied to your earlier email, with additional details, but would like to post one further comment.-in your previous email to us, the details you provided suggested this was a sql injection issue. As DotNetNuke does not suffer from this, due to our policy of using stored procedures and never using dynamic sql (http://www.dotnetnuke.com/Community/B... has further background), if the issue is effecting multiple DotNetNuke websites, it's likely to be either OS specific (e.g. a windows/IIS issue), database specific (a sql server issue), or more likely module specific (e.g. all the sites use a common 3rd party module)
 
Whilst we do examine various forensics such as IIS logs, dotnetnuke eventlog etc., what we can't do is do security audits and penetration tests against 3rd party modules – many of which are commercial and we don’t have a licence for. If the issue is found in vendor code, then you’re better to contact them directly. If the vendor does not know how to fix the vulnerability they’re welcome to email the security email address and we can help develop and test the fix(s) for them
 
Cathal

Buy the new Professional DNN7: Open Source .NET CMS Platform book Amazon US
 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Security Vulnerability?  Anyone else?Security Vulnerability? Anyone else?


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out