Yeah, I'm the root of the evil! Poor Spencer was just a minion.Don't try to blame Spencer. I read in the cestpit it was ALL YOUR FAULT!
Yeah, I'm the root of the evil! Poor Spencer was just a minion.Don't try to blame Spencer. I read in the cestpit it was ALL YOUR FAULT!
What data breach? We're here to discuss WHMCS's bad coding and the out of control cron job!.Let's keep this on topic if possible and discuss the likely GVH security breach. Thanks.
Nah, I thought that was the thing that triggered the mails and posted the link. It seemed the file was locked out of public access already.So delving slightly off topic here...
There was a WHMCS link posted to IRC earlier. Rogue-Oktay posted and asked people to ping it... Some did/looked and bunch of background crap happened. Growl.
cron.php
To those of you familiar with such / with installs... Can you access this file from remote locations? Require credentials in generic install?
WTF is that file normally?
http://pastebin.com/tjkjws2qSo delving slightly off topic here...
There was a WHMCS link posted to IRC earlier. Rogue-Oktay posted and asked people to ping it... Some did/looked and bunch of background crap happened. Growl.
cron.php
To those of you familiar with such / with installs... Can you access this file from remote locations? Require credentials in generic install?
WTF is that file normally?
Cron.php is an ioncube'd file that contains WHMCS 'daily chores'. Calculating totals, invoice generation, email notifications (for invoices, etc) - pretty much most of your automated tasks.So delving slightly off topic here...
There was a WHMCS link posted to IRC earlier. Rogue-Oktay posted and asked people to ping it... Some did/looked and bunch of background crap happened. Growl.
cron.php
To those of you familiar with such / with installs... Can you access this file from remote locations? Require credentials in generic install?
WTF is that file normally?
I can confirm some of what happened and purely from WHMCS logging.
2 IPs at Amazon poked something somewhere in WHMCS. This fired off a bunch of email/password activity. Picture is worth a 1000 words, so screencap time:
$cron->logActivity("Completed");
$cron->emailReport();
run_hook("DailyCronJob", array());
$cron->log("Cron Job Hooks Run...");
if ($cron->isScheduled("backups")) {
WHMCS was contacted this morning and basically hasn't a clue. Unsure what we are collectively looking at. My guess would be injected WHMCS install - as in something injected rogue. Script or config... But that's 100% speculation on my part.If it's this obvious that a couple of suspicious IPs were behind the WHMCS tinkering, why did they initially explain it away as a WHMCS bug?
I got those captures directly from GVH administrators.Where are those logfiles from? Damn, what did I miss?
If they didn't use any hooks and checked the logs that no files has been uploaded - then gvh is safe (not hacked) I think.So...
The custom hooks theory:
" its not hook related... [GVH] doesn't use any custom hooks"