I think that this is really ugly behaviour by PowerDNN.
I received the email below from my host provider PowerDNN that I initially thought was some attempt to discourage DNN users from migrating from their service – that is actually quite expensive I might add.
So I thought I would send it to my girlfriend who works for an IT company to see what she thought – her immediate reaction was similar to mine, that it was a “hoax”. Who would send such alarmist scaremongering correspondence to their customers?
After that I thought I would check it out at DNN and hardly surprisingly I have discovered that this is an issue that is beginning to catch much attention.
My initial reaction after reviewing the forum was that it was obvious that PowerDNN were failing to uphold the spirit of the open source community. Their considerable contempt and lack of gratitude, given we all actually owe our existence to the efforts (most freely contributed) of many dedicated persons in the DNN open source community, surprised me greatly.
How foolish they are to mass circulate such alarmist messages that can ultimately only undermine their own business. To attempt to profiteer at the expense of the greater DNN community through such ill-conceived scaremongering can only serve to undermine the confidence of the wider IT and business community in DNN.
PowerDNN as a third party host and developer have every right to take commercial advantage of any superior technology that they might claim to have developed. However it is the way in which they have gone about it that is of greater concern to me now and makes me wonder about the type of people I am doing business. Their behaviour gives me absolutely no confidence in any security patches or whatever that they contend to have added to my site.
I made contact with PowerDNN and was somewhat taken aback with the response that I received to the affect that they had discovered a security issue before DNN; implying that they weren’t going to share it they were going to exploit it. My immediate reaction to this response was again, what confidence can I have in their security patch, and what will be their attitude when someone else discovers a security issue that threatens their business (so again threatens my business) that they are either unaware or do not know how to rectify?
Having considered this issue it is my opinion that PowerDNN ought to put up or shut up. That is, they ought to reveal the security weakness, through the appropriate DNN channel, and advise how they have patched it for the benefit of the DNN community. But perhaps they will be unwilling to do so for fear that the egg might end up on them when it is revealed that this isn’t really a significant issue, or is a marketing/commercial hoax, and that they have actually just upset and wasted a lot of their customer’s time as they have mine.
A very disappointed customer of PowerDNN.
Subject: CRITICAL SECURITY NOTICE
Dear User Admin,
As a PowerDNN customer, you have many advantages available to you that
no-one else in the DotNetNuke community can provide. The foremost of
these is that you are not running a standard "vanilla" version of
DotNetNuke. You are running PowerDNN - a customized build of the
DotNetNuke Web Application Framework. PowerDNN is backed by a 24/7
staff and has many backend performance and security enhancements that
are only availble to PowerDNN customers.
As of Yesterday evening at 9:47PM US Central Time, the PowerDNN
Engineering Team, as lead by Mr. Tony Valenti and Mr. Joseph Ravioli,
discovered two Hyper-Critical security flaws in the standard DotNetNuke
Framework. If left unpatched, these security flaws would allow any
website visitor to alter your web.config file as well as remotely
execute SQL scripts against your database. Since last night, our entire
engineering team has been working around the clock to create patches for
all affected versions of DotNetNuke. As of 7:42PM US Central Time,
these patches have been created and deployed to all PowerDNN customers.
YOUR SITE IS NO LONGER VULNERABLE.
Over the next couple weeks, we will be gradually releasing more details
to the general community. We realize that because of the large number
of people running un-patched, standard versions of DotNetNuke, it is
especially important for us to approach this issue in a sensitive and
confidential manner. To aide with this, an online DotNetNuke Website
Scanner is now available from www.PowerDNN.com for non-PowerDNN
customers.
We are always here to help,
John Grange
VP of Business Development