Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...DNN jQuery AttackDNN jQuery Attack
Previous
 
Next
New Post
6/14/2012 8:25 AM
 

Hello..

This morning, reviewing our IIS logs and saw this jQuery attack on one of our Portal websites.  The IIS logs are reporting a 404 status for everything.  The csUserAgent is shown as Java/1.6.0_04.

/Resources/Shared/Scripts/jquery/jquery-ui.min.js
/Resources/Shared/Scripts/jquery/jquery.hoverIntent.min.js
/Resources/Shared/Scripts/jquery/jquery.min.js
/Resources/Shared/Scripts/jquery/).addClass(this._triggerClass).html(f==
/Resources/Shared/Scripts/jquery/);if(c.label===null)c.label=this.buttonElement.html();if(this.element.is(
/Resources/Shared/Scripts/jquery/).html(this.buttonElement.find(
/Resources/Shared/Scripts/jquery/).html());this.hasTitle||this.buttonElement.removeAttr(
/Resources/Shared/Scripts/jquery/,d.uiDialogTitlebar).html(
/Resources/Shared/Scripts/jquery/,j.html()).html(a.spinner)}this.xhr=d.ajax(d.extend({},a.ajaxOptions,{url:h,success:function(k,n){e.element.find(e._sanitizeSelector(c.hash)).html(k);e._cleanup();a.cache&&d.data(c,

IP was from Romania.

 
New Post
6/14/2012 1:49 PM
 
what do you mean by "attack" -I presume you're seeing lots of requests in your logs. If so it's not really something to be too worried with as the requests are for js files which themselves cannot inject content (if hosted on a htm/aspx page then a request in theory could)

Buy the new Professional DNN7: Open Source .NET CMS Platform book Amazon US
 
New Post
6/15/2012 2:58 PM
 

Jeff,

I got the same kind of attack on one of my sites. It triggered Page Load Exceptions in the DNN Event Log saying, "A potentially dangerous Request.Path value was detected". Here are two of the entries:

RawURL: /Resources/Shared/Scripts/jquery/,data:c,complete:function(a,b,c){c=a.responseText,a.isResolved()&&(a.done(function(a){c=a}),i.html(g?f(

AbsoluteURL: /Resources/Shared/Scripts/jquery/,data:c,complete:function(a,b,c)%7Bc=a.responseText,a.isResolved()&&(a.done(function(a)%7Bc=a%7D),i.html(g

AbsoluteURLReferrer:

UserAgent: Java/1.6.0_04

DefaultDataProvider: DotNetNuke.Data.SqlDataProvider, DotNetNuke.SqlDataProvider

ExceptionGUID: 9f42e231-7b2b-4599-ab5f-41b937501fb8

InnerException: A potentially dangerous Request.Path value was detected from the client (:).

FileName:

FileLineNumber: 0

FileColumnNumber: 0

Method: System.Web.HttpRequest.ValidateInputIfRequiredByConfig

StackTrace:

Message: DotNetNuke.Services.Exceptions.PageLoadException: A potentially dangerous Request.Path value was detected from the client (:). ---> System.Web.HttpException: A potentially dangerous Request.Path value was detected from the client (:). at System.Web.HttpRequest.ValidateInputIfRequiredByConfig() at System.Web.HttpApplication.ValidateRequestExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute() at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously) --- End of inner exception stack trace ---

 and...

RawURL: /Resources/Shared/Scripts/jquery/,j.html()).html(a.spinner)}this.xhr=d.ajax(d.extend({},a.ajaxOptions,{url:h,success:function(k,n){e.element.find(e._sanitizeSelector(c.hash)).html(k);e._cleanup();a.cache&&d.data(c,

AbsoluteURL: /Resources/Shared/Scripts/jquery/,j.html()).html(a.spinner)%7Dthis.xhr=d.ajax(d.extend(%7B%7D,a.ajaxOptions,%7Burl:h,success:function(k,n)%7Be.element.find(e._sanitizeSelector(c.hash)).html(k);e._cleanup();a.cache&&d.data(c,

AbsoluteURLReferrer:

UserAgent: Java/1.6.0_04

DefaultDataProvider: DotNetNuke.Data.SqlDataProvider, DotNetNuke.SqlDataProvider

ExceptionGUID: 0ee66043-3fd9-4409-822b-ea9fc926b2af

InnerException: A potentially dangerous Request.Path value was detected from the client (:).

FileName:

FileLineNumber: 0

FileColumnNumber: 0

Method: System.Web.HttpRequest.ValidateInputIfRequiredByConfig

StackTrace:

Message: DotNetNuke.Services.Exceptions.PageLoadException: A potentially dangerous Request.Path value was detected from the client (:). ---> System.Web.HttpException: A potentially dangerous Request.Path value was detected from the client (:). at System.Web.HttpRequest.ValidateInputIfRequiredByConfig() at System.Web.HttpApplication.ValidateRequestExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute() at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously) --- End of inner exception stack trace ---

 
New Post
6/18/2012 2:20 PM
 

Last week my site was hacked as well. I received a complaint from the site editor that hes could not modify the site because the "manage"buttons were not working.

After some investigation I found a number of Javascript files that were changed.

Infected files were:

/Resources/Shared/Scripts/initWidget.js
/Resources/Shared/Scripts/jquery/jquery.hoverIntent.min.js
/Resouces/ControlPanel/ControlPanel.debug.js
/js/dnncore.js
/js/dnnmodalpopup.js
/js/dnn.jquery.js
(This list may not be complete)

Once I restored the original files the site was working again. Avira identifies  these files as "JS/Blackhole.B". I have saved the malicious files on my local system and changed all important passwords on my site.

I will restrict access to the attacked directories and monitor the site more closely in the near future. Any ideas what more I can do to avoid further disruptions?

 Thanks in advance
Jos

 

 
New Post
6/18/2012 5:10 PM
 

Jos,

You could ask your webhosting provider to check their FTP logs (unless you have access to them) and see if the attack came via FTP (see if someone logged in during the timeframe of the attack). If so, then changing your FTP password to something stronger should help avoid a future attack.

If it wasn't an FTP attack, then it may have come through some sort of DNN access, and we would all like to know the details of that. One starting point would be to check the DNN Event Log for access during that time, along with the IIS web server logs.

Please let us know what you find out. Thanks.

 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...DNN jQuery AttackDNN jQuery Attack


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out