phpBB中的安全漏洞 [英] security flaws in phpBB

查看:368
本文介绍了phpBB中的安全漏洞的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我最近看到一个被破解的phpbb论坛。黑客删除了所有

账户,只在他控制下形成了一个管理员,并删除了所有

的文章。无论如何,他是怎么做到的?我怎样才能保护我的论坛?我认为phpBB的程序员负责SQL注入以及如此好的

已知的攻击...所以,我可以做什么作为论坛管理员和(相对)

熟练的PHP / MySQL程序员,以确保这样的事情不会发生在我的论坛上吗? (当然,我已经把你的MySQL基地每24小时备份一次了b / b



-

现在风暴已经经过我

我将离开沉寂在平静的海面上

并通过横梁上的裂缝永远看着她

Nailed穿过我梦想卧室的门口

I''ve recently seen a phpbb forum hacked. The hacker removed all
accounts, formed only one admin acc under his control and removed all
articles. How did he do that, anyway? And how can I protect my forums? I
presume programers of phpBB took care of SQL injection and such well
known attacks... so, what can I do as forum admin and (relatively)
skilled PHP/MySQL programer to make sure something like that doesn''t
happen to my forum? (ofcourse, I already DO backup my MySQL base every
24 hours)

--
"Now the storm has passed over me
I''m left to drift on a dead calm sea
And watch her forever through the cracks in the beams
Nailed across the doorways of the bedrooms of my dreams"

推荐答案

它运行的是什么版本的phpbb?

是否正在使用最新版本(修复了这个漏洞对付了这个蠕虫)?

Nikola Skoric写道:
what version of phpbb was it running?
was it using the latest version (that fixed the vulnerability against
that worm)?
Nikola Skoric wrote:
我最近看过一个phpbb论坛黑客攻击。黑客删除了所有
帐户,只在他的控制下形成了一个管理员并删除了所有
文章。无论如何,他是怎么做到的?我怎样才能保护我的论坛?我假设phpBB的程序员负责SQL注入以及如此良好的已知攻击...所以,作为论坛管理员和(相对)熟练的PHP / MySQL程序员,我能做些什么呢?确定这样的事情不会发生在我的论坛上吗? (当然,我已经24小时备份我的MySQL基地了)
I''ve recently seen a phpbb forum hacked. The hacker removed all
accounts, formed only one admin acc under his control and removed all
articles. How did he do that, anyway? And how can I protect my forums? I
presume programers of phpBB took care of SQL injection and such well
known attacks... so, what can I do as forum admin and (relatively)
skilled PHP/MySQL programer to make sure something like that doesn''t
happen to my forum? (ofcourse, I already DO backup my MySQL base every
24 hours)





" Nikola Skoric" < NI ******* @ net4u.hr>在消息中写道

新闻:MPG.1c5321038a0c63af989a4d@localhost ...

"Nikola Skoric" <ni*******@net4u.hr> wrote in message
news:MPG.1c5321038a0c63af989a4d@localhost...
我最近看到一个被破解的phpbb论坛。黑客删除了所有
帐户,只在他的控制下形成了一个管理员并删除了所有
文章。无论如何,他是怎么做到的?我怎样才能保护我的论坛?我假设phpBB的程序员负责SQL注入以及如此良好的已知攻击...所以,作为论坛管理员和(相对)熟练的PHP / MySQL程序员,我能做些什么呢?确定这样的事情不会发生在我的论坛上吗? (当然,我已经24小时备份我的MySQL基地了)

-
现在暴风雨已经过了我
我离开了漂浮在平静的海面上
通过梁上的裂缝永远地看着她
穿过我梦想的卧室的门口
I''ve recently seen a phpbb forum hacked. The hacker removed all
accounts, formed only one admin acc under his control and removed all
articles. How did he do that, anyway? And how can I protect my forums? I
presume programers of phpBB took care of SQL injection and such well
known attacks... so, what can I do as forum admin and (relatively)
skilled PHP/MySQL programer to make sure something like that doesn''t
happen to my forum? (ofcourse, I already DO backup my MySQL base every
24 hours)

--
"Now the storm has passed over me
I''m left to drift on a dead calm sea
And watch her forever through the cracks in the beams
Nailed across the doorways of the bedrooms of my dreams"




报告非常令人困惑。最初据报道,蠕虫

在unserialize()中利用缓冲区溢出。但是

全部并非如此。


我认为这个漏洞有一些事实可以解决phpBB使用的事实

eval()在其模板引擎中。当用户数据不正确时,会发生非常糟糕的事情。



The reports were very confusing. Initially it was reported that the worm
exploits an buffer overflow in unserialize(). But that was not the case at
all.

I think the vulnerability has something to do the fact that phpBB uses
eval() in its template engine. When user data is not correctly
escaped/filtered, very bad things happen.


Chung Leong写道:
Chung Leong wrote:
Nikola Skoric < NI ******* @ net4u.hr>在消息中写道
新闻:MPG.1c5321038a0c63af989a4d@localhost ...
[snip]
我认为这个漏洞有一些事实,即phpBB在其中使用了eval()模板引擎。当用户数据未正确转义/过滤时,会发生非常糟糕的事情。
"Nikola Skoric" <ni*******@net4u.hr> wrote in message
news:MPG.1c5321038a0c63af989a4d@localhost... [snip]
I think the vulnerability has something to do the fact that phpBB uses
eval() in its template engine. When user data is not correctly
escaped/filtered, very bad things happen.



如果情况确实如此,可以考虑以下几点:Rasmus Lerdorf

(PHP的创建者)说:如果eval()就是答案,你几乎肯定会问错误的问题。


我认为在高度用户数据驱动的应用程序中使用eval()会带来很高的风险。它可以节省大量的脚本时间,但我不想在eval()周围构建

,如果我可以避免它。


好​​奇什么关于这个话题还有更多的说法,phpBB很普遍!


If that is indeed the case, the following comes to mind, Rasmus Lerdorf
(creator of PHP) said: "If eval() is the answer, you''re almost certainly
asking the wrong question."

I think using eval() in a highly user-data driven application is a high
risk. It may save a lot of scripting time, but I would not like to build
my stuff around eval() if i can avoid it.

Curious what more is to be said on this topic, phpBB is widespread!


这篇关于phpBB中的安全漏洞的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆