Do you like this story?



RexHacker managed to deface the Forum and uploaded its custom message page as shown and account information of 79,500 registered users' may have been compromised. (The forum was defaced at the time of writing - Check Here)

The popular website MacRumors's Forum was compromised in last November using an alleged zero day exploit, which is based on vBulletin, a famous forum software. The openSUSE Forum is also based upon vBulletin.

Another interesting fact is that openSUSE is still using vBulletin 4.2.1, which is vulnerable to inject rogue administrator accounts flaw. Whereas, the latest patched vBulletin 5.0.5 is available. Possibly, Hacker exploits same or another known vBulletin version 4.2.1 vulnerability to access the website's administrative panel.

Zone-H Mirror of the defaced page: http://zone-h.org/mirror/id/21473823

It seems that openSUSE team is even not aware about the data breach, but we have informed them and also trying to contact RexHacker for further information on this.

Update (7:00 PM Tuesday, January 7, 2014 GMT): The Pakistani Hacker confirmed is that has uploaded a PHP shell on the forum server using his own Private vBulletin's zero-day exploit, that allows him to browse, read or write/overwrite any file on the Forum server without root privileges.

There are a few screenshots shared by hacker with us:

 
After openSUSE's tweet, RexHacker has shared some sample database screenshots on his Facebook account to prove the database hack. We have partially blur the screenshot before sharing, to keep sensitive data secure, as shown above. Update (4:00 AM Wednesday, January 8, 2014 GMT): In a blog post, openSUSE team confirmed that their website and database have been hacked, but users' passwords are not compromised. A cracker managed to exploit a vulnerability in the forum software which made it possible to upload files and gave access to the forum database. The team explained, they are using single-sign-on system (Access Manager from NetIQ) that manage the real passwords. Credentials for your openSUSE login are not saved in our application databases as we use a single-sign-on system (Access Manager from NetIQ) for all our services. This is a completely separate system and it has not been compromised by this crack. What the cracker reported as compromised passwords where indeed random, automatically set strings that are in no way connected to your real password.

0 comments :

Post a Comment

 
Top