I wouldimagine they're quite busy attempting damage control.Has anyone heard back from Solus yet?
I wouldimagine they're quite busy attempting damage control.Has anyone heard back from Solus yet?
Their site works for me.MannDude, I know you don't work there, but Urpad got hit too?
what. the. fuck.How much warning do you need as a software provider about your code being poorly written? And why do you write code like this? Sorry, but I can't fault any provider that was hit by this attack, and all I can say is that I am sorry that some of you guys had to suffer because of this:
<?php
if ($_POST['delete']) {
$xc = $db -> query('SELECT * FROM centralbackup WHERE id = \'' . $_POST['deleteid'] . '\'', true);
#[...]
if ($xc[status] == 'failed') {
exec('php /usr/local/solusvm/system/bus.php -- --comm=deletebackup --serverid=' . $xc['bserver'] . ' --nodeid=' . $vdata['nodeid'] . ' --vserverid=' . $vdata['vserverid'] . ' --filename=' . $xc['filename']);
#[...]
}
}
?>
D. Strout There's been a decoded version floating around the web for a while now, I guess that's how the vulnerability was found and exploited in the first place. Pretty lame, but it is what it is.
Guys, here is something simple that you should do immediately: restrict access to the admin path. Restrict it by IP, with a password, or ideally both. @Kujoe had some good advice as well on how to secure SolusVM.
Kind regards,
Marc
Yeah, don't work there anymore.MannDude, I know you don't work there, but Urpad got hit too?
What the f*Ck!?!?!?!Adam Ng ("Kevin Hillstrand") has had the URPad WHMCS and SolusVM DB (both dated) for a while and has always threatened to post it anytime we made him mad
Yes. That requires a thread of it's own, however. Be my guest.That's somehow unrelated, but is this 'Adam Ng' in any way related to Adam, the former owner of VPSLatch? I still have a bone to pick with that a**hole...
Yes. That requires a thread of it's own, however. Be my guest.
Liam @ LET patched this 0-day exploit yesterday. CVPS_Kevin got renamed to CVPS_Adam.Yes. That requires a thread of it's own, however. Be my guest.
The snippet from above was the source of the last exploit. If there's new code and solus patches it? You're then "fine" to post it since you've at least done due diligence by the vendor.So wait, I'm not allow to post code snippits, but he IS?
So you are allowed to steal WHMCS, but someone else isn't?So wait, I'm not allow to post code snippits, but he IS?
I messaged Jason earlier this morning and told him what was going on and it may be best to shut the Solus master off for a while.
I assumed they would have. Out of my hands.Would of been nice of them to contact their clients about this ... Urpads support has started to go down hill too...
Yes, towards the beginning of May. First or second week. Can't remember.Didn't they sell URPad a while back? I thought I read about a bunch of changes at URPad on LET a while back....
Changelog:Solusvm 1.14.00 BETA R5 is available..no changelog yet.