
Here is the news
http://forum.joomla.org/index.php/topic,203000.0.html
Kursat wrote:ad_hie wrote:lets be patient, waiting any info from joomla developer....
and keep monitoring this threat .....
I am trying to understand the weak parts cuz i have some joomla sites and have to take action to keep them.
I need to learn if joomla servers are behind corporate hardware firewalls or not.
Which apache server software official joomla is using.
Because i could not get info about firewalls at Rochen Hosting site.
If behind a well configured firewall these guys are real professionals.
AG2 wrote:
more like script kiddiez... definitely not a pro
mmikeyy wrote:These idiots (who call themselves "turkish crackers") have replaced the file "helpsites-15.xlm" at help.joomla.org. This file is downloaded whenever the help languages file is refreshed, which does not seem to always require a user intervention. The problem is that it can't be parsed, and the config menu becomes inaccessible after the file is replaced. This little hack may soon spread everywhere...
Kursat wrote:The same vulnerability is for mambo too.
They hit the system from file permissions, i guess
vistartony wrote:Kursat wrote:The same vulnerability is for mambo too.
They hit the system from file permissions, i guess
On what basic and what tests you say that?
Please explain
infograf768 wrote:mmikeyy wrote:These idiots (who call themselves "turkish crackers") have replaced the file "helpsites-15.xlm" at help.joomla.org. This file is downloaded whenever the help languages file is refreshed, which does not seem to always require a user intervention. The problem is that it can't be parsed, and the config menu becomes inaccessible after the file is replaced. This little hack may soon spread everywhere...
Not correct.
http://forum.joomla.org/index.php/topic ... #msg954556
It's been over 24hrs now, I do know it's a week-end (those guys didn't do this on a saturday without reason), but there are tools available to analize log files etc, and I thought Joomla were using a security scanner software on their code anyway, so it's getting a bit long to wait for info..?! There isn't even an announcement in the security forums so all users are at least warned and maybe take some defensive measures to secure their sites further?
I'd have liked to warn the french users about a potential issue, but with what?...
omponk wrote:look the google with keyname [mod edit: removed hacker name. Please do not name these hacker/s again. - WRobinson]
so many many web .
whereis log... hello somebody with site has been hack.. where is a log?
ilox wrote:In both your posts you have used that persons ID. Please edit your posts to delete any reference to that person. We must not give any sort of credit to somebody who does things like that. No Screenshots, No names, no links, nothing that might be identifying the ID. Thank you for your cooperation.
It has been more than a long day, but Joomla has survived, and will continue to not just survive but grow even stronger.
ilox - 19 Aug 2007
It has been more than a long day, but Joomla has survived, and will continue to not just survive but grow even stronger.
ilox - 19 Aug 2007
ilox wrote:Thank you Team for clearing up the site, the problems and above all the worry.
Each crack they find just makes us stronger.
It has been more than a long day, but Joomla has survived, and will continue to not just survive but grow even stronger.
Kursat wrote:
I am trying to understand the weak parts cuz i have some joomla sites and have to take action to keep them.
I need to learn if joomla servers are behind corporate hardware firewalls or not.
Which apache server software official joomla is using.
Because i could not get info about firewalls at Rochen Hosting site.
If behind a well configured firewall these guys are real professionals.
rsd wrote:
Hacking thru a website on a poorly written script (php, perl , asp, java) has nothing to do with a how good a filewall is.
Port 80 has to pass by it and there is no way for a firewall to differentiate a legitim request from a hacking attempt.
The only way to have this is to have a tool that sits before the webserver and filters the HTTP protocol that can pass or not. But for this to work, it has to be aware what is allowed and what is not in your scripts (not very doable).
There is a similar tool for IIS that protects IIS from attacks for all known vulnerability (a lot) and it costs several thousands of dolars.
So back toyour statement, this guys can be pros or scriptkids, but it has nothing to do, passing the firewall.
-rsd
rsd wrote:Hacking thru a website on a poorly written script (php, perl , asp, java) has nothing to do with a how good a filewall is.
Port 80 has to pass by it and there is no way for a firewall to differentiate a legitim request from a hacking attempt.
The only way to have this is to have a tool that sits before the webserver and filters the HTTP protocol that can pass or not. But for this to work, it has to be aware what is allowed and what is not in your scripts (not very doable).
There is a similar tool for IIS that protects IIS from attacks for all known vulnerability (a lot) and it costs several thousands of dolars.
-rsd