Jump to content
MDDHosting Forums

WHMCS - Critical Security Advisory for 5.x


Michael D.

Recommended Posts

Below is the contents of the WHMCS Notice found here for your convenience.

============

WHMCS has released new patches for the 5.2 and 5.1 minor releases. These updates provide targeted changes to address security concerns with the WHMCS product. You are highly encouraged to update immediately.

WHMCS has rated these updates as having critical security impacts. Information on security ratings is available at http://docs.whmcs.com/Security_Levels.

Releases
The following patch release versions of WHMCS have been published to address a specific SQL Injection vulnerability:
v5.2.8
v5.1.10

Security Issue Information

The resolved security issue was publicly disclosed by "localhost" on October 3rd, 2013.
The vulnerability allows an attacker, who has valid login to the installed product, to craft a SQL Injection Attack via a specific URL query parameter against any product page that updates database information.

Mitigation

WHMCS Version 5.2

Download and apply the appropriate patch files to protect against these vulnerabilities.

Patch files for affected versions of the 5.2 series are located on the WHMCS site as itemized below.

v5.2.8 (full version) - Downloadable from our Support System
v5.2.8 (patch only; for 5.2.7) - http://go.whmcs.com/218/v528_Incremental

To apply a patch, download the files indicated above and replace the files within your installation.
No upgrade process is required.

WHMCS Version 5.1

Download and apply the appropriate patch files to protect against these vulnerabilities.

Patch files for affected versions of the 5.1 series are located on the WHMCS site as itemized below.

v5.1.10 (patch only; for 5.1.9) - http://go.whmcs.com/226/v5110_Incremental

To apply a patch, download the files indicated above and replace the files within your installation. No upgrade process is required.

All version of WHMCS are affected by this vulnerability, however only 5.1 and 5.2 will be provided updates per our Long Term Support Policy.

You can read more about our Long Term Support Policy here:

http://docs.whmcs.com/Long_Term_Support

 

========

 

All resellers have been notified via email about this issue.

Link to comment
Share on other sites

Frank,

 

I do not believe you're running WHMCS but WHM [from memory without looking at your account details]. If you are running WHMCS - then it's up to you to perform the update. If you're unable to do so - WHMCS does have a service for this -> https://www.whmcs.com/services/upgrade-service/

 

Honestly though - updating WHMCS is as easy as following the directions provided in the update file. For the incremental you just upload the files over the existing files. For the complete - you would do the same thing but it may overwrite customizations if you're not careful using the full package.

Link to comment
Share on other sites

Indeed - CloudFlare is a nice solution for some protection against such attacks. It's not perfect - but it can help.

 

In this case I do not believe they would have protected against the issue before they added the rule set otherwise they wouldn't have had to add the rule set. We were attacked before CloudFlare had added this to their rule set I do believe.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...