RevCMS important exploit fix!

Page 1 of 3 123 LastLast
Results 1 to 15 of 31
  1. #1
    LETS REACH 666 POSTS?!!!! ImNotSatan is offline
    MemberRank
    Apr 2013 Join Date
    google.devLocation
    573Posts

    RevCMS important exploit fix!

    Hey, this is verry strange but in some way people managed to be able to exploit with $_SERVER['REMOTE_ADDR'];

    So you should put mysql_real_escape_string($_SERVER['REMOTE_ADDR']);

    at all queries!!!!!!!

    Huge hotel's has been hacked by this!


  2. #2
    The one and only! Hejula is offline
    MemberRank
    Nov 2008 Join Date
    4,128Posts

    Re: RevCMS important exploit fix!

    Not possible. The exploit is coming from somewhere else.

  3. #3
    YOLO <3 DutchenL is offline
    MemberRank
    Jul 2013 Join Date
    543Posts

    Re: RevCMS important exploit fix!

    I am also hacked I use revcms + phoenix emu

    Someone manages to fix all the account he wants, what is the issue? revcms? phoenix emu?

    - - - Updated - - -

    Quote Originally Posted by Hejula View Post
    Not possible. The exploit is coming from somewhere else.
    Do you know where?

  4. #4
    Account Upgraded | Title Enabled! Jamal7 is offline
    MemberRank
    Dec 2013 Join Date
    547Posts

    Re: RevCMS important exploit fix!

    Already fixed this exploit ;)

    Pretty hard to find.

  5. #5
    YOLO <3 DutchenL is offline
    MemberRank
    Jul 2013 Join Date
    543Posts

    Re: RevCMS important exploit fix!

    Quote Originally Posted by Sir Jamal View Post
    Already fixed this exploit ;)

    Pretty hard to find.
    Share it with the community.

  6. #6
    Account Upgraded | Title Enabled! Sledmore is offline
    MemberRank
    Jun 2009 Join Date
    1,133Posts

    Re: RevCMS important exploit fix!

    Someone had tried this on Habboon, they're most likely spoof the HTTP_CF_CONNECTING_IP. You make a check to see if the HTTP_CF_CONNECTING_IP is set, then run the filter_var function w/ FILTER_VALIDATE_IP and kill the page if needed.

    Though when they did this they had no success in achieving anything, but its still worth adding such a check.

  7. #7
    YOLO <3 DutchenL is offline
    MemberRank
    Jul 2013 Join Date
    543Posts

    Re: RevCMS important exploit fix!

    Quote Originally Posted by Sledmore View Post
    Someone had tried this on Habboon, they're most likely spoof the HTTP_CF_CONNECTING_IP. You make a check to see if the HTTP_CF_CONNECTING_IP is set, then run the filter_var function w/ FILTER_VALIDATE_IP and kill the page if needed.

    Though when they did this they had no success in achieving anything, but its still worth adding such a check.
    Where exactly in revcms?

  8. #8
    Developer Eronisch is offline
    MemberRank
    Jul 2009 Join Date
    The NetherlandsLocation
    1,328Posts

    Re: RevCMS important exploit fix!

    As far i know, you can't just set some random text into the remote_addr variable.

    Source: http://stackoverflow.com/questions/4...verremote-addr

    I did stumble on this though: http://blog.ircmaxell.com/2012/11/an...-i-hacked.html
    (Very interesting blog, he explains how he got acces to the admin section on stackoverflow)
    Last edited by Eronisch; 28-06-14 at 12:32 AM.

  9. #9
    Novice Livon is offline
    MemberRank
    Aug 2012 Join Date
    2Posts

    Re: RevCMS important exploit fix!

    There is a hack where you can make everyone staff i dont know how but its an exploit in almost all noob cms

  10. #10
    YOLO <3 DutchenL is offline
    MemberRank
    Jul 2013 Join Date
    543Posts

    Re: RevCMS important exploit fix!

    Quote Originally Posted by Livon View Post
    There is a hack where you can make everyone staff i dont know how but its an exploit in almost all noob cms
    Yes there is. But it's strange that nobody knows the fix.

  11. #11
    Not so spooky... MrSpooks is offline
    MemberRank
    May 2010 Join Date
    Under a rockLocation
    1,068Posts

    Re: RevCMS important exploit fix!

    Quote Originally Posted by Livon View Post
    There is a hack where you can make everyone staff i dont know how but its an exploit in almost all noob cms

    That is an exploit in the ASE that people use, there is also another exploit in the ASE that will allow you to clear a full database, So i would not recommend using any of the ASE released spechaly PulseAse and grapeASE is the other, But many renames of them are out there.

    But this really seems to be a strange exploit if it even is an exploit.

  12. #12
    YOLO <3 DutchenL is offline
    MemberRank
    Jul 2013 Join Date
    543Posts

    Re: RevCMS important exploit fix!

    Quote Originally Posted by Sledmore View Post
    Someone had tried this on Habboon, they're most likely spoof the HTTP_CF_CONNECTING_IP. You make a check to see if the HTTP_CF_CONNECTING_IP is set, then run the filter_var function w/ FILTER_VALIDATE_IP and kill the page if needed.

    Though when they did this they had no success in achieving anything, but its still worth adding such a check.
    Can someone make a tutorial how to do this in RevCMS?

  13. #13
    Novice Livon is offline
    MemberRank
    Aug 2012 Join Date
    2Posts

    Re: RevCMS important exploit fix!

    I asked the guy that made everyone staff in like 5 retros he said something about 'value=rank'01 IDK Dont remember.. Any1 that can realese how to do it?

  14. #14
    LETS REACH 666 POSTS?!!!! ImNotSatan is offline
    MemberRank
    Apr 2013 Join Date
    google.devLocation
    573Posts

    Re: RevCMS important exploit fix!

    Quote Originally Posted by Sir Jamal View Post
    Already fixed this exploit ;)

    Pretty hard to find.
    How about share it.. '-,-

    - - - Updated - - -

    Quote Originally Posted by Livon View Post
    I asked the guy that made everyone staff in like 5 retros he said something about 'value=rank'01 IDK Dont remember.. Any1 that can realese how to do it?
    Wow... are you litterly asking us on how to hack people.. sick man... sick...

  15. #15
    Member PSK is offline
    MemberRank
    Jan 2014 Join Date
    55Posts

    Re: RevCMS important exploit fix!

    if($_GET['url'] == 'news' || $_GET['url'] == 'articles')
    {
    $template->form->getPageNews();
    }
    }

    }

    final public function setParams($key, $value)
    {
    $this->params[$key] .= $value;
    }

    final public function filterParams($str)
    {
    foreach($this->params as $key => $value)
    {
    $str = str_ireplace('{' . $key . '}', $value, $str);
    Is the exploit says the hacker on my hotel himself, not got a clue how it is either lol



Page 1 of 3 123 LastLast

Advertisement