Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeDNN Open Source...DNN Open Source...Module ForumsModule ForumsStoreStoreDNN sites infected by this virus JS.RunforeDNN sites infected by this virus JS.Runfore
Previous
 
Next
New Post
7/8/2012 7:26 PM
 
IUser or IUsers should have only read permissions.  The application pool user must have read, write, change and execute permissions.  All settings have to inherit to all subfolders and files.
 
New Post
7/9/2012 4:30 AM
 

Thanks Matthias Schlomann,

I will ask my host to make these permission changes! Hopefully, I'll recover my site in a jiffy!

Regards
Jones

 
New Post
7/9/2012 4:38 PM
 

Hi Mathias,the issue is more danger.

I investigate the issue with my hosting provider, and this attack is due to a vulnerabilityof the Parallels control panel used in many windows hosting providers. The attack is done using file manager of control panel . Parallels already provide a fix for this.

Jones, keep watching your sites, because if the attacks keep come again your hosting provider must apply the fix.

The last version of the virus attack JS files and de default.aspx file, for all windows sites running on Parallels, not only DNN sites.

 

 
New Post
7/9/2012 5:58 PM
 

Hi Vitor,

I was thinking about we already post that it is a vulnerability not DNN related, but infectet hosts if there are any security issues on it.  But this would not supported from DNN.  About there was asking about the correct DNN permissions I have answered it. 

Well on a Parallels PLESK hosting infected system the hoster or server admin had to desinfect and close the security issue, but not DotNetNuke.

 

 
New Post
7/9/2012 6:04 PM
 
I would provide some removal information for infected systems. I found this usefull instructions on Symantec page http://www.symantec.com/security_resp...
 
Previous
 
Next
HomeHomeDNN Open Source...DNN Open Source...Module ForumsModule ForumsStoreStoreDNN sites infected by this virus JS.RunforeDNN sites infected by this virus JS.Runfore


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out