www.RaGEZONE.com
[ The Punisher ]
- Joined
- Nov 14, 2001
- Messages
- 29,441
- Reaction score
- 21,661
Hi,
There are a few methods to bypass CloudFlare and Incapsulas protection to get the originating server ip, the first being mail server headers (so what I do is use a third party server with modified mail headers that remove the sender IP which would be the server we are trying to protect) and the second is vBulletins image retrieval.
At the moment vBulletin has the following ;
This is bad! Anyone could simply use an ip logger such as
The work around.
We need to disable the following in php.ini (really only the fopen but include stops offsite injections).
And secondly we need to disable CURL, we could use the disable_function and add curl_init but then this would disable the facebook integration that's pre-built within vBulletin ! Not good! So , to combat this we do the following;
Edit includes/class_upload.php
find
replace with
Sorted! since all vBulletin base upload and image retrievals are based through this class its effectively side wide stopping any automatic retrievals and disabling the usage of ip image loggers.
There are a few methods to bypass CloudFlare and Incapsulas protection to get the originating server ip, the first being mail server headers (so what I do is use a third party server with modified mail headers that remove the sender IP which would be the server we are trying to protect) and the second is vBulletins image retrieval.
At the moment vBulletin has the following ;
- avatar image retrieval
- profile image retrieval
- album image retrieval
- ... etc
This is bad! Anyone could simply use an ip logger such as
You must be registered to see links
and then could insert the fake image into the URL field to download it would grab the source ip and bypassing CF/Incapsula. What originally I was doing was editing the template and removing option 1 (the ability to retrieve image url) but as it turns out this is no good, because you can just inject the original code using firebug or element inspector and pretend nothing was ever gone! I did this for months until it was brought to my attention two days ago!The work around.
We need to disable the following in php.ini (really only the fopen but include stops offsite injections).
Code:
allow_url_fopen = Off
allow_url_include = Off
And secondly we need to disable CURL, we could use the disable_function and add curl_init but then this would disable the facebook integration that's pre-built within vBulletin ! Not good! So , to combat this we do the following;
Edit includes/class_upload.php
find
Code:
if (ini_get('allow_url_fopen') == 0 AND !function_exists('curl_init'))
replace with
Code:
if (ini_get('allow_url_fopen') == 0)
Sorted! since all vBulletin base upload and image retrievals are based through this class its effectively side wide stopping any automatic retrievals and disabling the usage of ip image loggers.
Attachments
You must be registered for see attachments list