![]() |
I've seen code by the tmm guys, i seriously doubt there are any sql injection issues in nats...
|
Panchodog has had the admin locked down via specific full IPs for a very long time now.
|
Quote:
It's just that simple. |
Any input from NATS on this matter? I find this very disturbing, need a little reassurance please John
|
Quote:
|
Quote:
I have personally tested and proved SQL injections against NATS and CARMA [and dutifully reported them]. I have looked at the source of both, and literally just took a scroll through it again. There are exploitable areas. I haven't seen a mysql_real_escape_string anywhere in the code I saw, and 6 months ago, there were definite issues. HTML_special_chars / [and god forbid] addslashes and the ilk are not sql protection. Check out - http://www.gofuckyourself.com/showpo...&postcount=218 I know programmers love to piss on each other, but the fact of the matter is that basically ANY script online is susceptible to attack, whether it be by the script itself, or the frameworks that support it. |
Quote:
|
Quote:
How many people have access to the open source of NATS? Surely the only way to know where these exploits are, if what you say is correct, is to have access to the source. How come you have access to the source? |
Quote:
|
Quote:
I don't have the full source, I just have it for a few key files that were left on my server after a tech did an upgrade. TMM knows I have seen them, and I promised them to pass on any info I saw in there that might cause problems, and I have :) |
Quote:
|
Quote:
|
Quote:
John said in another thread that it "fully appears to be a compromised password list", so I guess the TMM passwords all got out somehow. Looks like that's all closed now as he also stated "We have changed our policy so that we no longer maintain ANY passwords to ensure this does not happen via us ever in the future" |
So, to summarise, since John's last post has gotten buried in a lot of FUD
It looks like a password list has gotten out so NATS owners should contact TMM to see if their customer data has been compromised. OC3 ([email protected]) have also said they can help people with this. TMM have or are in the process of changing all TMM passwords throughout their client base. TMM have now taken additional security measures by not storing all passes on their end to prevent this happening again. TMM are adding additional security measures (1-way encrypted passes) in future NATS releases. So, if I'm not mistaken, any current NATS owners should now be secured (or over the next day or two) from further compromise via this route. But, in all, everyone, nomatter what software you use, should take database security very seriously and daily audit any accounts (ssh/mysql/web-based) that have privilege access. Looks like this issue has come to resolution, so I'm off to enjoy my holidays :thumbsup |
It wouldn't be the first time it had happenned and it wouldn't be the first time someone got an admin's password and used it on other machines either.
I thought NATS were more security conscious than most though |
Quote:
|
NATS haters unite..lol. TMM is awesome and unliKe most other companies in the industry are on the problems before or as they happen. Its funny you see the shady programs come in here to bash nats when they are the most suspect. Your stats scare the shit out of me....0/10ooo+.
DO NOT TRUST PROGRAMS THAT HAVE CUSTOM BACKENDS. THEY ARE THE ONES TO WATCH FOR. |
Quote:
Quote:
Quote:
|
p.s. i should also mention at this point that one of the only sponsors i have heard from that WASN'T hacked was mayors money, and this is because THEY went thru extra security measures above and beyond.
big props to mayors money, your info is secure |
Quote:
|
Quote:
http://www.score-group.com/ http://www.evilgneiuscash.com/ http://www.dukedollars.com/ I haven't checked everyone and as I do have updated - corrected them. Thus far, these 4 programs do not have any logins from that IP. This is a short list of the SEVERAL that use the NATS built in security features that protect your members, webmasters, and admin data. NATS has the security features already - question is which sponsors are using them? |
Quote:
It so far just appears to be a harvest of emails |
Quote:
|
|
Quote:
|
Quote:
the bot is likely used to maintain the list thats why it accesses so often but the affiliate info would likely only be grabbed once making it alot harder to spot amongst the hundreds of email grabs :2 cents: |
Quote:
|
Quote:
True since they full access they probably collected much more... I just posted what we discovered back in October 2007 https://gfy.com/fucking-around-and-business-discussion/794159-nats-issue.html |
Quote:
And even if passwords are not available, I do, certainly, remember the 'become reseller' option... can affiliates examine their own password via their account's interface, or no? If "no," maybe the case is that I've misremembered, and would appreciate confirmation on that. Been awhile, and I don't have an updated version of NATs in front of me to play around with. |
Quote:
We had 1 login from that NATS admin account and the date matched on the day they were doing some work for us. We have also deleted that account just to extra carefull. Ray |
I wonder if anyone tried to warn people a long time ago that they had serious security issues but was bashed by all the guys John bought drinks for.
|
Quote:
|
Quote:
|
QuickBuck has not been compromised in any way.
|
Quote:
|
Quote:
|
Quote:
|
Quote:
Raises hand. |
Quote:
|
Quote:
|
All times are GMT -7. The time now is 04:14 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123