http://forum.joomla.it/index.php?topic=118057.0
http://securityreason.com/wlb_show/WLB-2010110041
How we have to resolve???
Cuase that i had my some if my sites hacked in date 9 november!
RFI Vulnerability in PhocaDownload!
-
Clarky
- Phoca Newbie

- Posts: 2
- Joined: 22 Nov 2010, 10:57
Re: RFI Vulnerability in PhocaDownload!
This is a pretty big deal. If you're not running a URL masker (sh404sef etc) and or a security product (rs firewall etc) you're at serious risk of getting hacked.
Can we get a comment from a developer to acknowledge the issue at least? Here's hoping a future release address the problem soon. I'll happily donate once this problem is addressed.
Cheers,
Clarky
Can we get a comment from a developer to acknowledge the issue at least? Here's hoping a future release address the problem soon. I'll happily donate once this problem is addressed.
Cheers,
Clarky
- Jan
- Phoca Hero

- Posts: 49144
- Joined: 10 Nov 2007, 18:23
- Location: Czech Republic
- Contact:
Re: RFI Vulnerability in PhocaDownload!
Hi, Phoca Download does not work with the variable: mosConfig
_absolute_path
Mostly Joomla! itself doesn't allow to access directly the file.
Exactly:
phocadownload.php is protected by:
defined( '_JEXEC' ) or die( 'Restricted access' );
so you get "Restricted access", nothing more.
simbus82
If your site was hacked, it was not through the Phoca Download.
Clarky

Anyway: Security is very important for Phoca extensions, this is why a lot of frontend cool features was not implemented to Phoca exteions.
The issue is under review like all potentional or absurd security issues. Thank you for letting me know this information.
Jan
_absolute_path
Mostly Joomla! itself doesn't allow to access directly the file.
Exactly:
phocadownload.php is protected by:
defined( '_JEXEC' ) or die( 'Restricted access' );
so you get "Restricted access", nothing more.
simbus82
If your site was hacked, it was not through the Phoca Download.
Clarky
???This is a pretty big deal. If you're not running a URL masker (sh404sef etc) and or a security product (rs firewall etc) you're at serious risk of getting hacked.
There is nothing to solve now, you can happily donateCan we get a comment from a developer to acknowledge the issue at least? Here's hoping a future release address the problem soon. I'll happily donate once this problem is addressed.
Anyway: Security is very important for Phoca extensions, this is why a lot of frontend cool features was not implemented to Phoca exteions.
The issue is under review like all potentional or absurd security issues. Thank you for letting me know this information.
Jan
If you find Phoca extensions useful, please support the project
-
Clarky
- Phoca Newbie

- Posts: 2
- Joined: 22 Nov 2010, 10:57
Re: RFI Vulnerability in PhocaDownload!
Thanks for the update. I was referring to SH404 being used to prevent 'vulnerable' urls from being found via a simple google search and a joomla security solution to prevent the RFI 'attack'. I was only going off what I saw posted on a hacking forum, I'm not that close to php security.
Donation made. Keep up the great work.
Donation made. Keep up the great work.
- Jan
- Phoca Hero

- Posts: 49144
- Joined: 10 Nov 2007, 18:23
- Location: Czech Republic
- Contact:
Re: RFI Vulnerability in PhocaDownload!
Great, thank you very much.
Jan
Jan
If you find Phoca extensions useful, please support the project
-
simbus82
- Phoca Newbie

- Posts: 7
- Joined: 17 Nov 2010, 17:49
Re: RFI Vulnerability in PhocaDownload!
Are you sure? I have seek throug all my joomla file.Jan wrote: simbus82
If your site was hacked, it was not through the Phoca Download.
Jan
All index.html are "modified" with a script.
Who write this script in my index.html?
I have found the code in /domains/studioagm.eu/public_html/components/com_phocadownload/models/user.php
Code: Select all
// Modified by Jan, only the current part of the file (not whole file) displayed here:
if (!JFile::exists($filepathUserFolder . DS ."index.html")) {
@JFile::write($filepathUserFolder . DS ."index.html", "<html>\n<body bgcolor=\"#FFFFFF\">\n
Vulnerability javascript code was modified here in this place
</body>\n</html>");
The malicius code
Code: Select all
Modified by Jan ... included vulnerability javascript code- Jan
- Phoca Hero

- Posts: 49144
- Joined: 10 Nov 2007, 18:23
- Location: Czech Republic
- Contact:
Re: RFI Vulnerability in PhocaDownload!
Hi, yes, seems like your server is not safe enough.
The php file on your server was modified (maybe someone has your ftp logins, maybe your php files can be overwritten by internet scripts - not secure permissions or ownership)
In this case, somebody (human or robot) modified a Phoca Download PHP file but it could be modified other php file on your server. This is wrong. The php file cannot be overwritten on the server.
You can find this code: JFile::write in your Joomla! installation, this is a standard method to write a file in Joomla!
so if somebody has modified the code in JFile::write() method, the same way he/it can add the JFile::write() in your php files... So you need to secure them and be sure, your ftp password is protect and nobody know it.
If the php on your server is modified, this is not a vulnerability of a component not of a Joomla! itself.
BTW: I have removed the vulnerability code from your post (because of security reason) but leaved the part of the file where this code was added.
Check your server, seems like human or robot can modify your php files, not he/she/it added the code the JFile::write method, but other script can do worse things (like modify sql queries, etc.)
Jan
The php file on your server was modified (maybe someone has your ftp logins, maybe your php files can be overwritten by internet scripts - not secure permissions or ownership)
In this case, somebody (human or robot) modified a Phoca Download PHP file but it could be modified other php file on your server. This is wrong. The php file cannot be overwritten on the server.
You can find this code: JFile::write in your Joomla! installation, this is a standard method to write a file in Joomla!
so if somebody has modified the code in JFile::write() method, the same way he/it can add the JFile::write() in your php files... So you need to secure them and be sure, your ftp password is protect and nobody know it.
If the php on your server is modified, this is not a vulnerability of a component not of a Joomla! itself.
BTW: I have removed the vulnerability code from your post (because of security reason) but leaved the part of the file where this code was added.
Check your server, seems like human or robot can modify your php files, not he/she/it added the code the JFile::write method, but other script can do worse things (like modify sql queries, etc.)
Jan
If you find Phoca extensions useful, please support the project