View Single Post
07-26-10, 10:58 AM   #60
Rilgamon
Premium Member
 
Rilgamon's Avatar
Premium Member
AddOn Author - Click to view addons
Join Date: Sep 2009
Posts: 822
Originally Posted by Dolby View Post
When did you last change your email address?

I'm sorry this happened to you again.

Just yesterday I had found a potential hole into our database where when you updated an AddOn the cached username could allow an injection based upon the users name. So far it looks like that was the only field that wasnt wrapped with mysql_real_escape_string() due to the fact it was getting the name from vbulletin and I wasnt thinking. I'm investigating the logs to see if anything was taken advantage of there.

We are upgrading to new servers soon (already upgraded our addon file server). I will again audit my mySQL queries and change all passwords (As I do with all moves).
I'm sure you've read this but since you mention vBulletin I thought this might be related:

http://www.h-online.com/open/news/it...n-1044462.html
__________________
The cataclysm broke the world ... and the pandas could not fix it!
  Reply With Quote