Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeOur CommunityOur CommunityCommunity Membe...Community Membe...Any PowerDNN users? Any PowerDNN users?
Previous
 
Next
New Post
5/21/2008 2:47 PM
 

JohnGrange wrote

Hi Guys,

When we discovered this vulnerability, it was found to be such a critical issue that we were compelled to secure our customers right away.  Our first responsibility is always going to be to make sure that PowerDNN customers are running high performance, secure, DNN installations.  Our customers have been overwhelmingly thankful for the hard work we've done to secure their sites.  Our team is putting together an official report which we will release to the community, it is important that everyone is aware of the issue.  We have been in contact with certain members of the core team as well as many of the top vendors in the community.  In terms of the $20, we could take that away but then we wouldn't be able to patch non-PowerDNN customers in any way that would be financially feasible.  If we got rid of the $20 charge, we could scan your site but not perform any fix.  This issue effects so many sites that we want to protect community by releasing the information in a thoughtful way.  We will get the information out via the normal DNN channels, but, we view this issue as being critical enough that waiting until the next release of DNN is not sufficient and we were compelled to take action immediately.  I hope this clears some things up for some people, we take issues like this very seriously, because like most of you, we love DotNetNuke and it is our livelyhood. 

John Grange

I hope fof PowerDNN's sake that the core team was contacted immediately. As it looks now, a pretty key member of the core team had no idea about this. You have a tool, for $20, that can patch this, which implies that the core team could also patch this vulnerability pretty quickly.


Chris
 
New Post
5/21/2008 2:59 PM
 

I am one of the members of our Security Task Force and actively monitor security@dotnetnuke.com. I can assure you that we have received NO COMMUNICATION from PowerDNN in regards to this issue. Instead, we have received a ton of email from PowerDNN hosting customers who are wondering why PowerDNN is charging for this information. I have no good answer for that question...


My comments are my own and are offered WITHOUT PREJUDICE

Shaun Walker
http://www.siliqon.com
 
New Post
5/21/2008 3:00 PM
 

GMartin wrote

 Tony Valenti wrote

 

Hey Dan,
We are working with the DotNetNuke Core Team to make this patch available to everyone.  We're not releasing the patch to the public as of yet because if the wrong people became aware of the flaw or its location, it would mean catastrophe for almost any non-PowerDNN customer who has set up DotNetNuke within the past year.

During this "Zero Day" time period, we are offering a service where our engineers will work with companies for virtually free to help them patch their mission critical websites while the DotNetNuke core team creates an "official" resolution to the issues.

I understand that you're really curious about what the flaw was, however, if you notice any changes, please hold back from discussing them.

Always glad to help,
-Tony Valenti

 

But what if malfeasants are able to come up with $20?  Are the PowerDNN engineers asking any trick questions to ensure that people buying the fix have good intensions? 

From what I understand of the actual fix, this should hopefully be a minimal issue as the change is inside one of the compiled .dll files for DotNetNuke.


-Mitchel Sellers
Microsoft MVP, ASPInsider, DNN MVP
CEO/Director of Development - IowaComputerGurus Inc.
LinkedIn Profile

Visit mitchelsellers.com for my mostly DNN Blog and support forum.

Visit IowaComputerGurus.com for free DNN Modules, DNN Performance Tips, DNN Consulting Quotes, and DNN Technical Support Services
 
New Post
5/21/2008 3:07 PM
 

Chris McCandless wrote

I hope fof PowerDNN's sake that the core team was contacted immediately. As it looks now, a pretty key member of the core team had no idea about this. You have a tool, for $20, that can patch this, which implies that the core team could also patch this vulnerability pretty quickly.

Chris, I am not aware of anyone on the core team who has been contacted, and there have certainly been quite a few posts about this in the private team forums.  Specifically, no one from the DotNetNuke management or  security teams have been contacted.  In the meantime we will continue to do our own security analysis to see if there is something we have missed, although that would certainly be easier if someone from PowerDNN would send a short email to security@dotnetnuke.com outlining the specific vulnerabilities involved.  Even without a detailed analysis and fix it would help us isolate our search and come up with a patch that could be made available to the community.


Joe Brinkman
DNN Corp.
 
New Post
5/21/2008 3:12 PM
 

Joe Brinkman wrote

 Chris McCandless wrote

 

I hope fof PowerDNN's sake that the core team was contacted immediately. As it looks now, a pretty key member of the core team had no idea about this. You have a tool, for $20, that can patch this, which implies that the core team could also patch this vulnerability pretty quickly.

 

Chris, I am not aware of anyone on the core team who has been contacted, and there have certainly been quite a few posts about this in the private team forums.  Specifically, no one from the DotNetNuke management or  security teams have been contacted.  In the meantime we will continue to do our own security analysis to see if there is something we have missed, although that would certainly be easier if someone from PowerDNN would send a short email to security@dotnetnuke.com outlining the specific vulnerabilities involved.  Even without a detailed analysis and fix it would help us isolate our search and come up with a patch that could be made available to the community.

Joe,

I'm not sure if it helps or not, but I've heard through a few grapevines today that Michael Washington might have been contacted....

EDIT: Per future post from Joe, I had been incorrectly informed.  I just wanted to be sure to note this here as this is the last post on the page.


-Mitchel Sellers
Microsoft MVP, ASPInsider, DNN MVP
CEO/Director of Development - IowaComputerGurus Inc.
LinkedIn Profile

Visit mitchelsellers.com for my mostly DNN Blog and support forum.

Visit IowaComputerGurus.com for free DNN Modules, DNN Performance Tips, DNN Consulting Quotes, and DNN Technical Support Services
 
Previous
 
Next
HomeHomeOur CommunityOur CommunityCommunity Membe...Community Membe...Any PowerDNN users? Any PowerDNN users?


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out