grumpydasmurf Posted August 2, 2011 Posted August 2, 2011 I guess I am one of the lucky ones. This is an email I got from a hacker... I guess it's onto the security thread but thought I would share it... Hi I am Ethical Hacker and penetration tester we discovered more than 80 vulnerabilities in web apps and we have private vulnerabilities also in joomla , oscommerce etc ... i found your site , i checked the security in your site http://chicagogunsmith.com and i found vulnerabilities that allows the hacker to hack your site to be sure that i am true your database info : define('DB_SERVER', 'localhost'); define('DB_SERVER_USERNAME', 'the actual info'); define('DB_SERVER_PASSWORD', 'the actual info'); define('DB_DATABASE', 'the actual info'); if you interest i can check your site , patch the vulnerabilities and make your site more secure than now Th cost will be 100$ if you interest reply to me Thanks Grumpy
burt Posted August 2, 2011 Posted August 2, 2011 $100 is cheap, but you should either do it yourself or pay more for a known "name" here at the osCommerce forum to do it for you. I know you know this, but for future readers of this post who might not realise; an "ethical" hacker might not be so ethical after all - could easily make hidden backdoors and so on...
Taipo Posted August 2, 2011 Posted August 2, 2011 Thomas, try this addon http://addons.oscommerce.com/info/7834. It is fairly straight forward to install from the instructions in the readme.htm. Then go into your images directory and remove all of those files in there that end in .php (basically if it isn't an image then remove it) Also in the images directory, place a file called .htaccess the following code in it. Options All -Indexes <Files ~"\.(php*|s?p?html|cgi|pl)$"> deny from all </Files> - Stop Oscommerce hacks dead in their tracks with osC_Sec (see discussion here)- Another discussion about infected files ::here::- A discussion on file permissions ::here::- Site hacked? Should you upgrade or not, some thoughts ::here::- Fix the admin login bypass exploit here- Pareto Security: New security addon I am developing, a remake of osC_Sec in PHP 5 with a number of fixes- BTC:1LHiMXedmtyq4wcYLedk9i9gkk8A8Hk7qX
grumpydasmurf Posted August 2, 2011 Author Posted August 2, 2011 $100 is cheap, but I am not going to pay this guy. I am workign on it right now to secure it myself. If I feel in over my head i will pay a professional to assist. here is the problem I have with so many add ons, and I like evryone have numerous, when I upgrade it's going to be a loooong drawn out process which is why I haven't yet upgraded. I'll check out that add on though. The order of the day is to secure secure secure until my brain turns to mush or I make my site stop working. .htaccess file done, thanks! BTW, you signature appears to have some good info in it Taipo. Grumpy
Taipo Posted August 2, 2011 Posted August 2, 2011 Its not so much an addon as it is a patch for the security holes that are in osCommerce 2.2x versions that have allowed attackers to exploit your site, in your case they have installed around 90 or so php files in the images directory that will be allowing them almost full access back dooring into your site. Once you have removed the offending files from the images directory you need to patch the faulty code which is what osC_Sec does....and its free ;) - Stop Oscommerce hacks dead in their tracks with osC_Sec (see discussion here)- Another discussion about infected files ::here::- A discussion on file permissions ::here::- Site hacked? Should you upgrade or not, some thoughts ::here::- Fix the admin login bypass exploit here- Pareto Security: New security addon I am developing, a remake of osC_Sec in PHP 5 with a number of fixes- BTC:1LHiMXedmtyq4wcYLedk9i9gkk8A8Hk7qX
burt Posted August 2, 2011 Posted August 2, 2011 Just follow the steps here; http://www.oscommerce.com/forums/topic/375288-updated-security-thread/page__view__findpost__p__1584648 Do step 5 first. Then start cleaning the site of bad files.
germ Posted August 2, 2011 Posted August 2, 2011 I posted about a week ago here that you had serious security problems. If I suggest you edit any file(s) make a backup first - I'm not perfect and neither are you. "Given enough impetus a parallelogramatically shaped projectile can egress a circular orifice." - Me - "Headers already sent" - The definitive help "Cannot redeclare ..." - How to find/fix it SSL Implementation Help Like this post? "Like" it again over there >
grumpydasmurf Posted August 2, 2011 Author Posted August 2, 2011 Sorry germ, I didn't see your reply that day. I appreciate it very much. Taipo, are you sure there are php files? There were weeks ago, see the thread germ refrenced, but I thoguht I removed all of them. A check today with file zilla, I am unable to see any files other than .gif and .jp (except the .htaccess file I just uploaded). I'll give your guys suggestions a try tonight, but if someone can verify the php files in the images folder because I am not seeing it. Grumpy
germ Posted August 2, 2011 Posted August 2, 2011 I can count around 90 right now. If I suggest you edit any file(s) make a backup first - I'm not perfect and neither are you. "Given enough impetus a parallelogramatically shaped projectile can egress a circular orifice." - Me - "Headers already sent" - The definitive help "Cannot redeclare ..." - How to find/fix it SSL Implementation Help Like this post? "Like" it again over there >
grumpydasmurf Posted August 2, 2011 Author Posted August 2, 2011 I can count around 90 right now. WTF?! I see none with ftp, and how do you see them anyways? http://www.chicagogunsmith.com/catalog/images ?! You should see error 403. Grumpy
germ Posted August 2, 2011 Posted August 2, 2011 I saw them before you added the tidbit that now denies access. They're there. Not sure why you can't see them with FTP. If I suggest you edit any file(s) make a backup first - I'm not perfect and neither are you. "Given enough impetus a parallelogramatically shaped projectile can egress a circular orifice." - Me - "Headers already sent" - The definitive help "Cannot redeclare ..." - How to find/fix it SSL Implementation Help Like this post? "Like" it again over there >
grumpydasmurf Posted August 2, 2011 Author Posted August 2, 2011 I saw them before you added the tidbit that now denies access. They're there. Not sure why you can't see them with FTP. I will remove htaccess right now temporarily. Ok I see some php files now in the list.... but CAN'T see them in ftp. This is so frustrating. filezilla and dreamweaver are both useless showing the same files, but none of the php files. Gonna have to break out the Linux book and putty. wtf now shell access denied by host? Awesome. Grumpy
germ Posted August 2, 2011 Posted August 2, 2011 I PM'd you a list. Not all are PHP files. If I suggest you edit any file(s) make a backup first - I'm not perfect and neither are you. "Given enough impetus a parallelogramatically shaped projectile can egress a circular orifice." - Me - "Headers already sent" - The definitive help "Cannot redeclare ..." - How to find/fix it SSL Implementation Help Like this post? "Like" it again over there >
Taipo Posted August 2, 2011 Posted August 2, 2011 Here is a visual of how to test for them. - Stop Oscommerce hacks dead in their tracks with osC_Sec (see discussion here)- Another discussion about infected files ::here::- A discussion on file permissions ::here::- Site hacked? Should you upgrade or not, some thoughts ::here::- Fix the admin login bypass exploit here- Pareto Security: New security addon I am developing, a remake of osC_Sec in PHP 5 with a number of fixes- BTC:1LHiMXedmtyq4wcYLedk9i9gkk8A8Hk7qX
grumpydasmurf Posted August 2, 2011 Author Posted August 2, 2011 Thanks for the list germ. Yes sir tapio, that's what I did after temp removing the htaccess. I see them now in http, but can't see them in ftp for some reason. I don't know why and gave up trying, so am trying to find a way to ssh/telnet into the server. Shell is disabled for some reason and telnet has always been disabled for "security reasons". working diligently on it now via cpanel file manager, but with so many files it lags the file manager. cpanel File manager seems to have the same problem as dreamweaver and filezilla. I'm only seeing jpg and gif. Grumpy
Taipo Posted August 2, 2011 Posted August 2, 2011 Email your web provider for the proper login details for FTP and use filezilla to ftp into the site. Some ftp servers are now using secure ftp, that sort of thing. Thats the info you need from your provider to correctly be able to login. Once thats done, then first things first, you need to empty out that image directory of those php files, then add the htaccess that I gave above, then patch the sites security. - Stop Oscommerce hacks dead in their tracks with osC_Sec (see discussion here)- Another discussion about infected files ::here::- A discussion on file permissions ::here::- Site hacked? Should you upgrade or not, some thoughts ::here::- Fix the admin login bypass exploit here- Pareto Security: New security addon I am developing, a remake of osC_Sec in PHP 5 with a number of fixes- BTC:1LHiMXedmtyq4wcYLedk9i9gkk8A8Hk7qX
grumpydasmurf Posted August 3, 2011 Author Posted August 3, 2011 Ok got the ssh worked out with my web host, a cpanel upgrade last week dropped my ssh access. Once I got that setup I cleaned up my images dir in seconds. Reinstalled the htaccess. Renamed my admin and added a password. Earlier I removed define_language and file_managr from /admin. ... gonna re-read this thread and work on the rest in the morning. LOL for all the time I put into the site, it's about time I get some sales! Thanks guys for all the help. I would have definetly missed those existing php fils, I thought I got them all weeks ago and with the FTP problem never would have known. Grumpy
Taipo Posted August 3, 2011 Posted August 3, 2011 The issue would have been since the site was not patched against the admin bypass exploit, the php files would have just all came back again. - Stop Oscommerce hacks dead in their tracks with osC_Sec (see discussion here)- Another discussion about infected files ::here::- A discussion on file permissions ::here::- Site hacked? Should you upgrade or not, some thoughts ::here::- Fix the admin login bypass exploit here- Pareto Security: New security addon I am developing, a remake of osC_Sec in PHP 5 with a number of fixes- BTC:1LHiMXedmtyq4wcYLedk9i9gkk8A8Hk7qX
grumpydasmurf Posted April 2, 2012 Author Posted April 2, 2012 I posted a reply today but obviously it was also removed at the same time as another thread I started. I am not sure what's going on here... I figured I'd just mention it since I got not Private Message or anything saying not to do what ever I did. Grumpy
vampirehunter Posted April 11, 2012 Posted April 11, 2012 Hi can someone point me to the definitive list of things I should do to secure a brand new 2.3.1 installation? which addons, things i should change? i Tried oscommerce about 4 years back but that table layout almost made me kill myself. I see that the new version is CSS ready, so hopefully I can try again, but the contributions thing is also a problem. I found it really annoying going through all them coded files replacing so many bits, i hope i don't have to do so many again Please advise of the 2.3.1 security procedures to make it strong and safe from hackers. thanks
Taipo Posted April 15, 2012 Posted April 15, 2012 2.3.1 is pretty much secure. It has been in play for a couple of years now and no bad security issues have appeared. There are a couple of things you can do to make sure you are using the most security, for example, make sure you are using the htaccess basic authentication function that comes as a part of 2.3.1 The rest is optional including the security addons that were principly developed for the earlier versions of osCommerce which had a few serious security issues. - Stop Oscommerce hacks dead in their tracks with osC_Sec (see discussion here)- Another discussion about infected files ::here::- A discussion on file permissions ::here::- Site hacked? Should you upgrade or not, some thoughts ::here::- Fix the admin login bypass exploit here- Pareto Security: New security addon I am developing, a remake of osC_Sec in PHP 5 with a number of fixes- BTC:1LHiMXedmtyq4wcYLedk9i9gkk8A8Hk7qX
Recommended Posts
Archived
This topic is now archived and is closed to further replies.