Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeOur CommunityOur CommunityGeneral Discuss...General Discuss...Microsoft Site Defacement hacked by DotNetNuke security flawMicrosoft Site Defacement hacked by DotNetNuke security flaw
Previous
 
Next
New Post
6/21/2006 3:41 AM
 
Hello all,

Have you read this press release where the Microsoft France site was hacked: http://blog.washingtonpost.com/securityfix/2006/06/microsoft_site_defacement_spur_1.html

Does anyone know if this was caused by the BDPDT flaw issue that was identified a while ago, or is this a different security flaw?

From the Press Release:
First thoughts were: "initial investigation points to a mis-configuration of a web server at a third party hosting facility as the most likely cause of the compromise. Upon completion of our investigation more information regarding the cause will be posted to the MSRC blog."

And on:

Update, 10:35 a.m. ET, June 20: Web site defacement archive Zone-h.org posted a follow-up today on this break-in, where they apparently interviewed the guy that attacked Microsoft's site. According to Zone-H co-author Roberto Preatoni, the hacker broke in using an unpatched flaw in DotNetNuke an open-source content management system designed to interact with ASP.NET, a Web development language from Microsoft. I left a message with the people over at DotNetNuke, but no word yet on whether they're aware of this issue.

"The attacker revealed that he exploited a .net script 0day vulnerability after discovering that expert.microsoft.fr had installed and was running a vulnerable .net nuke script.

This hole allowed the attacker to gain the same rights as the script, and that was enough to to upload a FSO script, a kind of shell used by the attacker to create a new folder and upload the defacement. "


Lee Sykes - DNN Creative Magazine - 600+ Video Tutorials, Articles, Interviews - July Issue 58 out now!
DNN Creative Magazine for DotNetNuke

Twitter: www.twitter.com/DNNCreative

Lee Sykes's Facebook Profile
 
New Post
6/21/2006 6:45 AM
 

yes, we're aware of this and are waiting on feedback/evidence from all concerned parties (the blog has not been updated - the author was spoken to yesterday, as were zone-h and Microsoft). I posted a few further notes @

http://dotnetnuke.com/Community/ForumsDotNetNuke/tabid/795/forumid/118/threadid/46611/scope/posts/Default.aspx


Buy the new Professional DNN7: Open Source .NET CMS Platform book Amazon US
 
Previous
 
Next
HomeHomeOur CommunityOur CommunityGeneral Discuss...General Discuss...Microsoft Site Defacement hacked by DotNetNuke security flawMicrosoft Site Defacement hacked by DotNetNuke security flaw


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out