Announcement

Collapse
No announcement yet.

Potential vBSEO vulnerability email from VBulletin.

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Zachery
    commented on 's reply
    Either find a replacement or get rid of VBSEO. There are alternatives available

  • Mark.B
    replied
    As Wayne mentioned, the information we posted is all that we received.

    Leave a comment:


  • Ian Cunningham
    replied
    Do you know how to tell if we've been affected by this problem? i.e. how were the IB sites hacked, is there anywhere we can check for code injections?

    Uninstalling VBSEO right now...

    Leave a comment:


  • Paul M
    replied
    You dont need to make the Suspect File Versions change.
    Its just a "nice to have" and means that the file you edited wont be listed when you view that page, it has no effect on the security fix itself.

    Leave a comment:


  • Riasat
    replied
    Originally posted by RaajS View Post
    I am unable to understand the following part : If you are running the "Suspect File Versions" diagnostics tool, you will additionally need to generate a new MD5 sum of the above file and edit upload/includes/md5_sums_crawlability_vbseo.php to use the new MD5 sum on the line:
    You can ignore this part safely if it is complicated for you

    Leave a comment:


  • donald1234
    replied
    Have a look at this archived page from the former vbseo forum for instructions to remove VBSEO

    http://web.archive.org/web/201301221...all-vbseo-238/

    Leave a comment:


  • Trevor Matthews
    replied
    I would love to remove vbseo completely, my forum is niche and I do not care if it is found by anyone on the internet or not.
    I am in a lucky position.

    BUT how do you remove it without breaking the forum???

    regards
    Trevor

    Leave a comment:


  • Wayne Luke
    replied
    The above information is all we received. I don't know anything further than that. I also don't have a copy of vBSEO to test with at this time.

    The safest and most secure choice would be to remove vBSEO from your systems and either use native links or a competing product that is still being developed and supported.

    Leave a comment:


  • pmkb
    replied
    I have a few vb 3.8x forums using various versions of vbseo 3.5/3.6. On two of them, I see the two lines that are recommended to comment out in the functions_vbseo_hook file repeated 2-3 times. Is it recommended to comment out each instance of those two lines, or is it specific to a certain block of code within the file?

    Leave a comment:


  • donald1234
    replied
    If you are looking for an alternative to VBSEO that is supported, you should check out DBSEO at http://www.dragonbyte-tech.com/produ...ragonbyte-seo/ the lite version is free but if you want to import your VBSEO rewrite rules you will need the pro version.

    Leave a comment:


  • holwebs
    replied
    Originally posted by Wayne Luke View Post
    If you think you might be running a vulnerable version of the software, there is a simple fix: just comment out the following lines in the file vbseo/includes/functions_vbseo_hook.php:
    Code:
    if(isset($_REQUEST['ajax']) && isset($_SERVER['HTTP_REFERER']))
    $permalinkurl = $_SERVER['HTTP_REFERER'].$permalinkurl;
    should be changed to:
    Code:
    // if(isset($_REQUEST['ajax']) && isset($_SERVER['HTTP_REFERER']))
    // $permalinkurl = $_SERVER['HTTP_REFERER'].$permalinkurl;

    I've received the email too & am looking at alternatives to vbseo. Meanwhile has anyone implemented this change. What does it do & what may stop working.

    I also didn't understand the reference to "Suspect File Versions" diagnostics tool. Anyone?

    Have just realised that this thread is in VB4 support. I'm still running vB 3.8.8 Does it refer to that too?

    Leave a comment:


  • RaajS
    replied
    I am unable to understand the following part : If you are running the "Suspect File Versions" diagnostics tool, you will additionally need to generate a new MD5 sum of the above file and edit upload/includes/md5_sums_crawlability_vbseo.php to use the new MD5 sum on the line:

    Leave a comment:


  • Wayne Luke
    replied
    If you think you might be running a vulnerable version of the software, there is a simple fix: just comment out the following lines in the file vbseo/includes/functions_vbseo_hook.php:
    Code:
    if(isset($_REQUEST['ajax']) && isset($_SERVER['HTTP_REFERER']))
    $permalinkurl = $_SERVER['HTTP_REFERER'].$permalinkurl;
    should be changed to:
    Code:
    // if(isset($_REQUEST['ajax']) && isset($_SERVER['HTTP_REFERER']))
    // $permalinkurl = $_SERVER['HTTP_REFERER'].$permalinkurl;

    Leave a comment:


  • Mark.B
    replied
    It is a genuine email and those links are shopping links owned by vBulletin's parent company, Internet Brands.
    I'm afraid I don't have a copy of the email, it is sent from an emailing system.

    Leave a comment:


  • Trevor Matthews
    replied
    That's interesting so those dodgy looking web links at the bottom of the email are genuine then???
    The hover over links at the bottom of the email started click.shopping

    How are they genuine???

    If this is genuine can some one please upload the full details again as I deleted the email.

    regards
    Trevor

    Leave a comment:

widgetinstance 262 (Related Topics) skipped due to lack of content & hide_module_if_empty option.
Working...
X