Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Upgrading DNN P...Upgrading DNN P...Security ExploitSecurity Exploit
Previous
 
Next
New Post
8/25/2010 6:55 AM
 
Hi I've just noticed something strange on my DNN site. A random piece of script has appeared below the </form tag and above the Google Urchin tag. I'm not sure if it is an exploit related to a module, or DNN itself. I am running version 05.04.02 (66). Here is the script that is embedded at the bottom of the page:

<code>
<MARQUEE ONMOUSEOVER=this.start() width="2" SCROLLDELAY="22800"��HEIGHT="8" ONMOUSEOUT=this.stop() >links:<a href="http://www.nimade.info">nimade</a></marquee></code>


										
 
New Post
8/25/2010 7:13 AM
 
please check your source code, has the default.aspx file in the root of your site been modified or is the text bee injected by a module or JS file?

Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
8/25/2010 7:30 AM
 
I haven't made any updates to the Default.aspx or other files in a while. I guess it must be an injection or issued with a module. I'm new to the DNN stuff, so I'm not sure where to start on this one. The site doesn't use too many modules. Mainly pageblaster, and the DigNuke flash module.

I don't know what to do, if I should just upgraded to the latest minor version of DNN, or how to investigate where the problem is originating from?
 
New Post
8/25/2010 10:22 AM
 
please open default.aspx on th web server with a text editor and check for the code being added.

Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
8/25/2010 10:50 AM
 
Hi Sebastian, I did as you suggested and you are correct, the offending code was in the default.aspx. What does this mean for me? Does that mean somebody has hacked the server, or is it still possible it was injected somehow?
 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Upgrading DNN P...Upgrading DNN P...Security ExploitSecurity Exploit


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out