Michael D. Posted October 3, 2013 Report Share Posted October 3, 2013 Below is the contents of the WHMCS Notice found here for your convenience.============WHMCS has released new patches for the 5.2 and 5.1 minor releases. These updates provide targeted changes to address security concerns with the WHMCS product. You are highly encouraged to update immediately.WHMCS has rated these updates as having critical security impacts. Information on security ratings is available at http://docs.whmcs.com/Security_Levels.ReleasesThe following patch release versions of WHMCS have been published to address a specific SQL Injection vulnerability:v5.2.8v5.1.10Security Issue InformationThe resolved security issue was publicly disclosed by "localhost" on October 3rd, 2013.The vulnerability allows an attacker, who has valid login to the installed product, to craft a SQL Injection Attack via a specific URL query parameter against any product page that updates database information.MitigationWHMCS Version 5.2Download and apply the appropriate patch files to protect against these vulnerabilities.Patch files for affected versions of the 5.2 series are located on the WHMCS site as itemized below.v5.2.8 (full version) - Downloadable from our Support Systemv5.2.8 (patch only; for 5.2.7) - http://go.whmcs.com/218/v528_IncrementalTo apply a patch, download the files indicated above and replace the files within your installation.No upgrade process is required.WHMCS Version 5.1Download and apply the appropriate patch files to protect against these vulnerabilities.Patch files for affected versions of the 5.1 series are located on the WHMCS site as itemized below.v5.1.10 (patch only; for 5.1.9) - http://go.whmcs.com/226/v5110_IncrementalTo apply a patch, download the files indicated above and replace the files within your installation. No upgrade process is required.All version of WHMCS are affected by this vulnerability, however only 5.1 and 5.2 will be provided updates per our Long Term Support Policy.You can read more about our Long Term Support Policy here:http://docs.whmcs.com/Long_Term_Support ======== All resellers have been notified via email about this issue. Quote Link to comment Share on other sites More sharing options...
frankacter Posted October 3, 2013 Report Share Posted October 3, 2013 Michael, Will this update applied to VPS accounts by MDD support?Frank Quote Link to comment Share on other sites More sharing options...
Michael D. Posted October 3, 2013 Author Report Share Posted October 3, 2013 Frank, I do not believe you're running WHMCS but WHM [from memory without looking at your account details]. If you are running WHMCS - then it's up to you to perform the update. If you're unable to do so - WHMCS does have a service for this -> https://www.whmcs.com/services/upgrade-service/ Honestly though - updating WHMCS is as easy as following the directions provided in the update file. For the incremental you just upload the files over the existing files. For the complete - you would do the same thing but it may overwrite customizations if you're not careful using the full package. Quote Link to comment Share on other sites More sharing options...
frankacter Posted October 3, 2013 Report Share Posted October 3, 2013 You are exactly right Michael, I'm using WHM. That said, spotted this in the CloudFlare blog:http://blog.cloudflare.com/patching-a-whmcs-zero-day-on-day-zero A nice stopgap for admins until they get the patch in place. Quote Link to comment Share on other sites More sharing options...
Michael D. Posted October 3, 2013 Author Report Share Posted October 3, 2013 Indeed - CloudFlare is a nice solution for some protection against such attacks. It's not perfect - but it can help. In this case I do not believe they would have protected against the issue before they added the rule set otherwise they wouldn't have had to add the rule set. We were attacked before CloudFlare had added this to their rule set I do believe. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.