Raised This Month: $ Target: $400
 0% 

Bug Report New exploit?


Post New Thread Reply   
 
Thread Tools Display Modes
Author Message
egorka2
Member
Join Date: Jun 2010
Old 12-24-2014 , 10:21   New exploit?
Reply With Quote #1

Hi! Somewhere 2 weeks ago noticed that my sourcebans, there were new admins. I deleted them, then appeared again. It later emerged that dude just a couple of minutes breaks my password on admin and add new admin quietly. And by the logs, modify the data and it can unlock players as Guest.

Naturally passwords are very complex, changing after every break, external access to the database is closed, the 1.4.11 version costs with the latest LFI Fix. None of this helps! As soon as he wants to, he immediately gets my password and goes through my account!

Hacker's steamid - STEAM_0:0:71645076



77.232.152.119 - - [24/Dec/2014:18:03:21 +0300] "GET /index.php?p=home HTTP/1.0" 200 36446
77.232.152.119 - - [24/Dec/2014:18:03:22 +0300] "GET /themes/sourcebans_dark/css/css.php HTTP/1.0" 200 22931
77.232.152.119 - - [24/Dec/2014:18:03:22 +0300] "POST /index.php HTTP/1.0" 200 136
77.232.152.119 - - [24/Dec/2014:18:03:22 +0300] "POST /index.php HTTP/1.0" 200 141
77.232.152.119 - - [24/Dec/2014:18:03:22 +0300] "POST /index.php HTTP/1.0" 200 136
77.232.152.119 - - [24/Dec/2014:18:03:22 +0300] "POST /index.php HTTP/1.0" 200 141
77.232.152.119 - - [24/Dec/2014:18:03:23 +0300] "POST /index.php HTTP/1.0" 200 141
77.232.152.119 - - [24/Dec/2014:18:03:23 +0300] "POST /index.php HTTP/1.0" 200 136
77.232.152.119 - - [24/Dec/2014:18:03:23 +0300] "POST /index.php HTTP/1.0" 200 141
77.232.152.119 - - [24/Dec/2014:18:03:23 +0300] "POST /index.php HTTP/1.0" 200 136
77.232.152.119 - - [24/Dec/2014:18:03:23 +0300] "POST /index.php HTTP/1.0" 200 536
77.232.152.119 - - [24/Dec/2014:18:03:23 +0300] "POST /index.php HTTP/1.0" 200 141
77.232.152.119 - - [24/Dec/2014:18:03:23 +0300] "POST /index.php HTTP/1.0" 200 533
77.232.152.119 - - [24/Dec/2014:18:03:23 +0300] "POST /index.php HTTP/1.0" 200 141
77.232.152.119 - - [24/Dec/2014:18:03:24 +0300] "GET /index.php?p=admin&c=admins HTTP/1.0" 200 104610
77.232.152.119 - - [24/Dec/2014:18:03:25 +0300] "GET /themes/sourcebans_dark/css/css.php HTTP/1.0" 200 22931
77.232.152.119 - - [24/Dec/2014:18:03:25 +0300] "POST /index.php HTTP/1.0" 200 134
77.232.152.119 - - [24/Dec/2014:18:03:25 +0300] "POST /index.php HTTP/1.0" 200 139
77.232.152.119 - - [24/Dec/2014:18:03:25 +0300] "POST /index.php HTTP/1.0" 200 134
77.232.152.119 - - [24/Dec/2014:18:03:25 +0300] "POST /index.php HTTP/1.0" 200 139

Last edited by egorka2; 12-24-2014 at 10:40.
egorka2 is offline
Sarabveer
Veteran Member
Join Date: Feb 2014
Old 12-24-2014 , 10:38   Re: New exploit?
Reply With Quote #2

Change every-single password. For MySQL, then Rcon, then SourceBans.

IDK what this exploit is.
__________________

Last edited by Sarabveer; 12-24-2014 at 10:45.
Sarabveer is offline
egorka2
Member
Join Date: Jun 2010
Old 12-24-2014 , 10:53   Re: New exploit?
Reply With Quote #3

All passwords are changed ten times, it does not help. order ssl certificate for some statistics too hard.
egorka2 is offline
Rytis
Veteran Member
Join Date: Feb 2012
Location: Germany
Old 12-24-2014 , 11:55   Re: New exploit?
Reply With Quote #4

I would completely reinstall SourceBans and import the bans

I bet he already created a backdoor for himself

Last edited by Rytis; 12-24-2014 at 11:56.
Rytis is offline
Sarabveer
Veteran Member
Join Date: Feb 2014
Old 12-24-2014 , 14:30   Re: New exploit?
Reply With Quote #5

Quote:
Originally Posted by Rytis View Post
I would completely reinstall SourceBans and import the bans

I bet he already created a backdoor for himself
True!

I feel like removing the Demo's function all-together. Since it has so many exploits.
__________________
Sarabveer is offline
egorka2
Member
Join Date: Jun 2010
Old 12-24-2014 , 15:25   Re: New exploit?
Reply With Quote #6

Found the backdoor. This gif file as a script on the home page. Remove. Plus set SSL. I think now it will be normal.
egorka2 is offline
Rytis
Veteran Member
Join Date: Feb 2012
Location: Germany
Old 12-24-2014 , 16:23   Re: New exploit?
Reply With Quote #7

Do you still have a copy of the gif file? If so, could you PM me with the file? I would appreciate it
Rytis is offline
Sarabveer
Veteran Member
Join Date: Feb 2014
Old 12-24-2014 , 17:11   Re: New exploit?
Reply With Quote #8

Can I also have the gif file. Also, did it come pre-installed with SourceBans?
__________________
Sarabveer is offline
egorka2
Member
Join Date: Jun 2010
Old 12-25-2014 , 13:31   Re: New exploit?
Reply With Quote #9

Sent to all who asked. Check pm
egorka2 is offline
Peace-Maker
SourceMod Plugin Approver
Join Date: Aug 2008
Location: Germany
Old 12-26-2014 , 14:04   Re: New exploit?
Reply With Quote #10

I'd like to have a look at this as well
__________________
Peace-Maker is offline
Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -4. The time now is 22:13.


Powered by vBulletin®
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
Theme made by Freecode