Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Security Vulnerability?  Anyone else?Security Vulnerability? Anyone else?
Previous
 
Next
New Post
1/13/2010 10:50 AM
 

Keep in mind through all of this, whether DNN or not, that there are many other methods to make a server vulnerable.  Secure code is one thing, secure admins are another.  Injecting header and footer content doesn't require access to DNN or any coding (not saying this is the case in your instance), and a failure of any part of the system as a whole can result in failure of the system.  That includes FTP access, strong passwords, physical security, social engineering, network security, server security and many more functions.

And if you haven't upgraded DNN yet, why not?  :)

Jeff

 
New Post
1/13/2010 12:00 PM
 

 Jeff -

We have looked at other possibilites.  We are discounting those primarily because all the sites we have found, including ours, that show the symptoms are does, 

a) are inserted into specific DNN tables (the rogue content is inserted into the header & footer sections of an individual modules content settings), typically one that is also set to "show on all pages" like a navigation.

b) have classes inserted that use the term DNN in them (eg: class="Comment dnn" or similar).

While it would be possible for a hacker to affect only DNN sites with a non-dnn-related hack, we don't see it as likely, especially with a hack whose sole purpose, we believe, is promoting his/her SEO by inserting links which for the most part are completely hidden.  

WHy haven't we upgraded? (we are at 4.9.5 now) Good question.  This site, which has over 12k pages, was an Ektron site which we have converted to DNN.  We still have some content in the Ektron system that has not been converted.  We also have written a lot of custom stuff such as Admissions Applications and such.  As a result, our web.config is pretty complex.  We did attempt an upgrade to 5.x last month and it failed miserably, , so we rolled it back...

Anyway, our logic is if we KNEW that the upgrade would resolve the problem, we would commit the time.  Our client is pretty stingy on hours right now, so most of what we are doing right now working on this security issue is on our time (ie, unpaid) and not theirs.  

 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...Security Vulnerability?  Anyone else?Security Vulnerability? Anyone else?


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out