Ravens PHP Scripts: Forums
 

 

View next topic
View previous topic
Post new topic   Reply to topic    Ravens PHP Scripts And Web Hosting Forum Index -> NukeSentinel(tm)
Author Message
Dawg
RavenNuke(tm) Development Team



Joined: Nov 07, 2003
Posts: 928

PostPosted: Fri Jun 04, 2004 3:04 am Reply with quote

Greetings Raven and all,
I installed Senitinal Last night. This morning I went to upload some new pictures to my site BOOM....I got the FULL effect. It does work!

I have the report it generated and info on excatly what I was doing hen it kicked in....I assume you would be interested in seeing it.

Where would you like the details sent to?

Dawg
 
View user's profile Send private message
stephen2417
Worker
Worker



Joined: Jan 18, 2004
Posts: 244
Location: Bristolville, OH

PostPosted: Fri Jun 04, 2004 3:07 am Reply with quote

You may just post the info here.. Leaving the site name and other personal info out..
 
View user's profile Send private message Visit poster's website
Dawg







PostPosted: Fri Jun 04, 2004 3:45 am Reply with quote

I have had 3 so far...It seems every time I touch "Gallery" to do "Admin" type funstions it fires off....

Here is 1....

Date & Time: 2004-06-04 01:44:40
Blocked IP:
User ID: ME (9Cool
Reason: Abuse - OTHER
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For: none
Client IP: none
Remote Address:
Remote Port: 1780
Request Method: GET

#2........

Date & Time: 2004-06-04 01:54:33
Blocked IP:
User ID: ME (9Cool
Reason: Abuse - OTHER
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For: none
Client IP: none
Remote Address:
Remote Port: 1222
Request Method: GET

#3
Date & Time: 2004-06-04 02:10:40
Blocked IP:
User ID: ME (9Cool
Reason: Abuse - OTHER
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For: none
Client IP: none
Remote Address:
Remote Port: 1985
Request Method: GET

#4....
Date & Time: 2004-06-04 02:10:55
Blocked IP:
User ID: ME (9Cool
Reason: Abuse - OTHER
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For: none
Client IP: none
Remote Address:
Remote Port: 2038
Request Method: GET

There are the 4 so far. Like I said It seems to fire off anytime I use the admin fuctions in Gallery.

I am using ver 1.1 BTW.
 
Raven
Site Admin/Owner



Joined: Aug 27, 2002
Posts: 17088

PostPosted: Fri Jun 04, 2004 5:02 am Reply with quote

It's the &cmd value that is setting it off. We'll have to look into it. Thanks!
 
View user's profile Send private message
redville
New Member
New Member



Joined: Jan 22, 2004
Posts: 9

PostPosted: Fri Jun 04, 2004 6:55 am Reply with quote

After seeing this I checked gallery also and got banned when I tried to rebuild the thumbnails.

I had Sentinel 1.10 installed and then seen 1.20 was out so I installed it and got banned again.

I had not tried the ban function, but I see what it does now. Its great, even though as some have warned it did not crash my computer. I shut off my pop up blocker and was able to hit Alt&Ctrl&Delete and close it out, of course I was expecting it.

Can you tell me which function would control this so I can disable it for now, since I don't want a member to get accidently banned.

Thanks
 
View user's profile Send private message
Raven







PostPosted: Fri Jun 04, 2004 7:02 am Reply with quote

Rather than turn it completely off which could leave you vulnerable, try this first. Find this code on or about line 109 in includes/sentinel.php
Code:
  if (eregi("http\:\/\/", $name) OR eregi("cmd",$querystring) OR eregi("exec",$querystring) OR eregi("concat",$querystring)) {
and modify it to
Code:
  if (eregi("http\:\/\/", $name) OR (eregi("cmd",$querystring) AND !eregi("&cmd",$querystring)) OR eregi("exec",$querystring) OR eregi("concat",$querystring)) {
 
redville







PostPosted: Fri Jun 04, 2004 7:04 am Reply with quote

Figured it out, its the string query that is setting it off.

I shut it off and was able to admin gallery.
 
redville







PostPosted: Fri Jun 04, 2004 7:18 am Reply with quote

Of course this is what is causing it in the sentinel.php "OR eregi("cmd",$querystring)" because I removed it, enabled the query string again, and was able to admin the gallery without being banned.

Is it possible to rewrite it so admin's or approved members can use the gallery functions but anyone else it would set off the ban.

Thanks
 
redville







PostPosted: Fri Jun 04, 2004 7:19 am Reply with quote

Sorry Raven, you must have been posting while I was.

Thanks
 
redville







PostPosted: Fri Jun 04, 2004 7:25 am Reply with quote

That fix did it, I didn't get banned for rebuilding the thumbs this time.
 
Dawg







PostPosted: Fri Jun 04, 2004 7:25 pm Reply with quote

Raven,
Will this work for anyone with "Photo" access or just an admin?

I give Photo Galleries to my registered members. (I run a Sport Fishing Site) and The members that use this feature have control over their own gallery. Will this work? or will they be banned?

Dawg
 
Raven







PostPosted: Fri Jun 04, 2004 7:28 pm Reply with quote

It should work for any uri request_stirng containing &cmd
 
NovemberRain
New Member
New Member



Joined: Jul 12, 2003
Posts: 8
Location: Istanbul

PostPosted: Sat Jun 05, 2004 1:12 pm Reply with quote

Code:
Date & Time: 2004-06-05 19:14:44

Blocked IP: ********
User ID: executer (992)
Reason: Abuse - OTHER
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For: *******
Client IP: none
Remote Address: *********
Remote Port: 26215
Request Method: GET
 
View user's profile Send private message ICQ Number
sixonetonoffun
Spouse Contemplates Divorce



Joined: Jan 02, 2003
Posts: 2496

PostPosted: Sat Jun 05, 2004 4:29 pm Reply with quote

Its the username exec is a substring of executer
You'll have to decide either to remove the exec code or set the filter to email only for now.
 
View user's profile Send private message
sixonetonoffun







PostPosted: Sat Jun 05, 2004 5:34 pm Reply with quote

Building on what Raven did with cmd above NovemberRain try this its working ok for me but I only tested it briefly.
Around line 112 in includes/sentinel.php
change this line
if (eregi("http\:\/\/", $name) OR eregi("cmd",$querystring) OR eregi("exec",$querystring) OR eregi("concat",$querystring)) {
To this:
Code:


 if (eregi("http\:\/\/", $name) OR (eregi("cmd",$querystring) AND !eregi("&cmd",$querystring)) OR eregi("exec",$querystring) AND !eregi("execu",$querystring) OR eregi("concat",$querystring)) {
 
 
ballymuntrev
Hangin' Around



Joined: Mar 22, 2004
Posts: 49

PostPosted: Sat Jun 05, 2004 5:45 pm Reply with quote

I got this one today...

Code:
X-Mailer: Sentinelâ„¢ 

Date: Sat, 05 Jun 2004 18:02:03 +0100




Date & Time: 2004-06-05 18:02:03
Blocked IP: 81.0.234.209
User ID: Anonymous (1)
Reason: Abuse - OTHER
--------------------
User Agent: Python-urllib/1.15
Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For: none
Client IP: none
Remote Address: 81.0.234.209
Remote Port: 56335
Request Method: GET
--------------------
Who-Is for IP
81.0.234.209 


Is that the same as what others said above ? Or was it really a hack/exploit attempt ?

Ta,

Trev.
 
View user's profile Send private message Visit poster's website
sixonetonoffun







PostPosted: Sat Jun 05, 2004 5:59 pm Reply with quote

Trev,
That was a legit attack.
 
ballymuntrev







PostPosted: Sat Jun 05, 2004 6:00 pm Reply with quote

Thanks six Smile
 
sixonetonoffun







PostPosted: Sat Jun 05, 2004 6:05 pm Reply with quote

Grr and your attacker while stupid enough to leave indexing on encoded his variable names lol!!!!!
 
twelves
Regular
Regular



Joined: Aug 22, 2003
Posts: 84

PostPosted: Sun Jun 06, 2004 11:29 am Reply with quote

A valid user got this:

Reason: Abuse - SCRIPT

Query String: www.blah.com/modules.php?name=Web_Links&l_op=viewlinkdetails&lid=96&ttitle=Cube-Tec_(formerly_Spectral_Design)
Forwarded For: none
Client IP: none
Remote Address: 213.217.**.*
Remote Port: 56473
Request Method: GET

Embarassed
 
View user's profile Send private message Visit poster's website
sixonetonoffun







PostPosted: Sun Jun 06, 2004 11:46 am Reply with quote

Yep thats the () in the title. This has been reported we're looking into options to qualify the filter but there are so many potential mis uses its hard to create something that is going to still catch all the evil. Yet allow the good ones through while maintaining an acceptable level of performance.

Its best to just not allow them.
 
Raven







PostPosted: Sun Jun 06, 2004 12:56 pm Reply with quote

I agree with Six. You could also just set the setting to E-Mail only and that way you can look at each occurrence and respond accordingly. I'd just avoid the () in my titles Smile
 
NovemberRain







PostPosted: Tue Jun 15, 2004 9:54 am Reply with quote

Code:
Date & Time: 2004-06-15 13:57:31

Blocked IP: **.***.****
User ID: Joe_Sadriabi (102)
Reason: Abuse - SCRIPT
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For:xxxxx
Client IP: none
Remote Address: xxxxxx
Remote Port: 41499
Request Method: POST
--------------------
Who-Is for IP
xxxxxxxxx



Code:
Date & Time: 2004-06-15 14:12:10

Blocked IP: xxxxxxxxx
User ID: Joe_Sadriabi (102)
Reason: Abuse - SCRIPT
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For: xxxxxxxxxxx
Client IP: none
Remote Address: xxxxxxxxxx
Remote Port: 50165
Request Method: POST
--------------------
Who-Is for IP
xxxxxx



Code:
Date & Time: 2004-06-15 14:13:05

Blocked IP: xxxxxxxx
User ID: Joe_Sadriabi (102)
Reason: Abuse - SCRIPT
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For: xxxxxxx
Client IP: none
Remote Address: xxxxxxxx
Remote Port: 57845
Request Method: POST
--------------------
Who-Is for IP
xxxxxxxxx
 
NovemberRain







PostPosted: Tue Jun 15, 2004 3:01 pm Reply with quote

Code:
Date & Time: 2004-06-15 23:40:15

Blocked IP: xxxxxxxx
User ID: cmdmrr (4368)
Reason: Abuse - OTHER
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows 98) Query String: [ Only registered users can see links on this board! Get registered or login! ]
Forwarded For: none
Client IP: none
Remote Address: xxxxxxxxxxx
Remote Port: 1408
Request Method: GET
--------------------
Who-Is for IP
xxxxxxx
 
Raven







PostPosted: Tue Jun 15, 2004 3:11 pm Reply with quote

This last one is answered in this very thread on this very page, up above.
 
Display posts from previous:       
Post new topic   Reply to topic    Ravens PHP Scripts And Web Hosting Forum Index -> NukeSentinel(tm)

View next topic
View previous topic
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum


Powered by phpBB © 2001-2007 phpBB Group
All times are GMT - 6 Hours
 
Forums ©