Message Turncoat in a DM to get moderator attention

Users Online(? lurkers):
10 / 73 posts

Luna - Forums


Posts: 694

1. The CMS installed on this site is outdated.  It has several exploits.  Please update this for everyones privacy.  Such as exposing your SQL database password.  (Login: s**/Password: p**)

2. The CMS application also has several vulnerabilities that would allow forum users to DDOS and/or run unrestricted java scripts.

3. There are multiple ports to the domain that should be secured, I would speak to BWF about closing them.

4. The domain registrar contains your personal e-mail address.  This should be removed.

5. Obfuscate your java scripts.

Posts: 1156
Luna - Forums

 Excellent work.

Posts: 2876
Luna - Forums

 My brother will email you 

Posts: 2337
Luna - Forums

 Jesus, Luna... are you sure you know enough about this stuff to be in business? From the looks of this post... ya don't. You know, arrogance doesn't fill in for talent and talent still needs to be coupled with skill. I hope you're still in school. 

Posts: 2876
Luna - Forums

 I'm sure 

Posts: 130
Luna - Forums

 

by HelloTech

1. The CMS installed on this site is outdated.  It has several exploits.  Please update this for everyones privacy.  Such as exposing your SQL database password.  (Login: s**/Password: p**)

2. The CMS application also has several vulnerabilities that would allow forum users to DDOS and/or run unrestricted java scripts.

3. There are multiple ports to the domain that should be secured, I would speak to BWF about closing them.

4. The domain registrar contains your personal e-mail address.  This should be removed.

5. Obfuscate your java scripts.

 

5. Obfuscating javascript is not an issue, as the javascript used is not sensitive and neither is obfuscation of javascript a reliable protection against determined attempts to unobfuscate. It'll be given serious consideration going forward in new works and updates, as opposed to it being a "fix it right this instant" problem.

4. That is not our personal e-mail address, but no e-mail of ours should have been shown in the first place. We're contacting BWF to double check this.

3. Contacted BWF regarded ports. Their initial conclusion is the current open ports are fine and needed given the server and its services. Will followup privately with BWF about each port to ensure their validity and security.

2. Currently investigating the DDOS and/or unrestricted java scripts.

1. The source of the password exposure was quickly fixed after an investigation. The affected password has since been changed. Additional followup testing will be done to ensure it really is fixed. The "CMS" is actually a frameworks, and is currently up to date in every respect possible. That's not to say it can't have vulnerabilities, since security issues are constantly uncovered and fixed even in the most modern of applications. We are grateful for your discovery and reporting of this vulnerability, as opposed to a malicious user being the first to find this issue.

Posts: 130
Luna - Forums

 

by Silkthread

 Jesus, Luna... are you sure you know enough about this stuff to be in business? From the looks of this post... ya don't. You know, arrogance doesn't fill in for talent and talent still needs to be coupled with skill. I hope you're still in school. 

I'm actually responsible for the security of the code in use. Things like this can be blamed on me, insofar as detecting and fixing them go. I've found that the world of online security is a beast.

Posts: 694
Luna - Forums

 

by Michael Prey

 5. Obfuscating javascript is not an issue, as the javascript used is not sensitive and neither is obfuscation of javascript a reliable protection against determined attempts to unobfuscate. It'll be given serious consideration going forward in new works and updates, as opposed to it being a "fix it right this instant" problem.

4. That is not our personal e-mail address, but no e-mail of ours should have been shown in the first place. We're contacting BWF to double check this.

3. Contacted BWF regarded ports. Their initial conclusion is the current open ports are fine and needed given the server and its services. Will followup privately with BWF about each port to ensure their validity and security.

2. Currently investigating the DDOS and/or unrestricted java scripts.

1. The source of the password exposure was quickly fixed after an investigation. The affected password has since been changed. Additional followup testing will be done to ensure it really is fixed. The "CMS" is actually a frameworks, and is currently up to date in every respect possible. That's not to say it can't have vulnerabilities, since security issues are constantly uncovered and fixed even in the most modern of applications. We are grateful for your discovery and reporting of this vulnerability, as opposed to a malicious user being the first to find this issue.

 

Not a problem man, I use these forums too.

Posts: 2829
Luna - Forums

 This is kind of scary as someone that has no idea what any of these terms mean. Just how much info can you get from someone using a seemingly anonymous forum like this?

Posts: 1156
Luna - Forums

 Good thing Tech was here to point them out.

10 / 73 posts
This site contains NSFW material. To view and use this site, you must be 18+ years of age.