Here is the news
http://forum.joomla.org/index.php/topic,203000.0.html
Kursat wrote:I am trying to understand the weak parts cuz i have some joomla sites and have to take action to keep them.ad_hie wrote: lets be patient, waiting any info from joomla developer....
and keep monitoring this threat .....
I need to learn if joomla servers are behind corporate hardware firewalls or not.
Which apache server software official joomla is using.
Because i could not get info about firewalls at Rochen Hosting site.
If behind a well configured firewall these guys are real professionals.
When i see the attackers message 1st time i looked at attackers web site mainpage.AG2 wrote:
more like script kiddiez... definitely not a pro

Not correct.mmikeyy wrote: These idiots (who call themselves "turkish crackers") have replaced the file "helpsites-15.xlm" at help.joomla.org. This file is downloaded whenever the help languages file is refreshed, which does not seem to always require a user intervention. The problem is that it can't be parsed, and the config menu becomes inaccessible after the file is replaced. This little hack may soon spread everywhere...

On what basic and what tests you say that?Kursat wrote: The same vulnerability is for mambo too.
They hit the system from file permissions, i guess
only with the information we get from this forum,vistartony wrote:On what basic and what tests you say that?Kursat wrote: The same vulnerability is for mambo too.
They hit the system from file permissions, i guess
Please explain
I agree with infograf768, this does not seem a core hack,infograf768 wrote:Not correct.mmikeyy wrote: These idiots (who call themselves "turkish crackers") have replaced the file "helpsites-15.xlm" at help.joomla.org. This file is downloaded whenever the help languages file is refreshed, which does not seem to always require a user intervention. The problem is that it can't be parsed, and the config menu becomes inaccessible after the file is replaced. This little hack may soon spread everywhere...
http://forum.joomla.org/index.php/topic ... #msg954556




I understand your concern Eyez,It's been over 24hrs now, I do know it's a week-end (those guys didn't do this on a saturday without reason), but there are tools available to analize log files etc, and I thought Joomla were using a security scanner software on their code anyway, so it's getting a bit long to wait for info..?! There isn't even an announcement in the security forums so all users are at least warned and maybe take some defensive measures to secure their sites further?
I'd have liked to warn the french users about a potential issue, but with what?...


The very large majority of cracked sites are not joomla sites. Period.omponk wrote: look the google with keyname [mod edit: removed hacker name. Please do not name these hacker/s again. - WRobinson]
so many many web .
whereis log... hello somebody with site has been hack.. where is a log?
I have to respectfully disagree.ilox wrote: In both your posts you have used that persons ID. Please edit your posts to delete any reference to that person. We must not give any sort of credit to somebody who does things like that. No Screenshots, No names, no links, nothing that might be identifying the ID. Thank you for your cooperation.


It has been more than a long day, but Joomla has survived, and will continue to not just survive but grow even stronger.
ilox - 19 Aug 2007


It has been more than a long day, but Joomla has survived, and will continue to not just survive but grow even stronger.
ilox - 19 Aug 2007

Very good words iloxs.ilox wrote: Thank you Team for clearing up the site, the problems and above all the worry.
Each crack they find just makes us stronger.
It has been more than a long day, but Joomla has survived, and will continue to not just survive but grow even stronger.
Hacking thru a website on a poorly written script (php, perl , asp, java) has nothing to do with a how good a filewall is.Kursat wrote:
I am trying to understand the weak parts cuz i have some joomla sites and have to take action to keep them.
I need to learn if joomla servers are behind corporate hardware firewalls or not.
Which apache server software official joomla is using.
Because i could not get info about firewalls at Rochen Hosting site.
If behind a well configured firewall these guys are real professionals.
Hi rsdrsd wrote:
Hacking thru a website on a poorly written script (php, perl , asp, java) has nothing to do with a how good a filewall is.
Port 80 has to pass by it and there is no way for a firewall to differentiate a legitim request from a hacking attempt.
The only way to have this is to have a tool that sits before the webserver and filters the HTTP protocol that can pass or not. But for this to work, it has to be aware what is allowed and what is not in your scripts (not very doable).
There is a similar tool for IIS that protects IIS from attacks for all known vulnerability (a lot) and it costs several thousands of dolars.
So back toyour statement, this guys can be pros or scriptkids, but it has nothing to do, passing the firewall.
-rsd
Many firewalls have a built-in IDS which can detect these "script attacks".rsd wrote: Hacking thru a website on a poorly written script (php, perl , asp, java) has nothing to do with a how good a filewall is.
Port 80 has to pass by it and there is no way for a firewall to differentiate a legitim request from a hacking attempt.
The only way to have this is to have a tool that sits before the webserver and filters the HTTP protocol that can pass or not. But for this to work, it has to be aware what is allowed and what is not in your scripts (not very doable).
There is a similar tool for IIS that protects IIS from attacks for all known vulnerability (a lot) and it costs several thousands of dolars.
-rsd