Author Topic: FA admin account compromised (yet again)  (Read 17401 times)

yak

  • Posts: 4
  • E-points: +0/-0
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #220 on: January 14, 2011, 02:45:46 am »
Yeah I know. It's being worked on. Every admin will probably have an @fa.net email address in the end and additional session security will be implemented for admin cp to prevent a leaked session/hijacked admin account from causing damage without going through the secondary authentication. For now basic auth will do, it'll be improved later.
Running online communities is like building a life size replica of the Eiffel tower with snakes.

Jim Demintia

  • Postcount ate Whippany, NJ
  • ****
  • Posts: 628
  • E-points: +24/-6
  • Deflator Mouse
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #221 on: January 14, 2011, 08:22:45 am »
Yeah I know. It's being worked on. Every admin will probably have an @fa.net email address in the end and additional session security will be implemented for admin cp to prevent a leaked session/hijacked admin account from causing damage without going through the secondary authentication. For now basic auth will do, it'll be improved later.

Since you're here, what about this:

the code probably still has as many holes as it did this time last month.
Confirming that FA is still completely vulnerable to the same attack that caused FAleaks.  It'd be slightly more complicated to pull off, but that's all.
Can it be this sad design
Could be the very same
A wooly man without a face
And a beast without a name

Conan

  • Sean Piche Wannabe Club
  • Postcount ate Whippany, NJ
  • ****
  • Posts: 603
  • E-points: +33/-9
  • ¯\(°_o)/¯
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #222 on: January 14, 2011, 02:45:59 pm »
Yeah I know. It's being worked on. Every admin will probably have an @fa.net email address in the end..

Quote
[12:29:42] <net-cat> Also, all the staff have @furaffinity.net email addresses. Some of us opt to not use it. It is not, as you say, a "paid privilege."

Will they be forced to use them or will they be allowed to "opt out" like net-cat says they can? Sounds to me like if they already all have them anyways, the easiest thing to do right now is to force them to use their FA email on their FA accounts. No exceptions. If someone has trouble checking a second email address every day than maybe their position on FA staff is too difficult for them as well.

ProvincialTwit

  • Abuse Dept.
  • Postcount ate Whippany, NJ
  • ****
  • Posts: 774
  • E-points: +72/-33
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #223 on: January 14, 2011, 05:28:32 pm »
They'll just pop them with whatever popular webmail service they prefer, leaving the whole thing just as open and insecure as ever.

Fiz

  • nice
  • Cabalistic Fuckhead
  • *
  • Posts: 94
  • E-points: +13/-1
  • no stop
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #224 on: January 14, 2011, 06:56:36 pm »
pee

Pi

  • POOR IMPULSE CONTROL
  • Postcount ate Whippany, NJ
  • ****
  • Posts: 614
  • E-points: +40/-10
  • <blink>yes hello</blink>
    • View Profile
    • Clan Spum userpage
Re: FA admin account compromised (yet again)
« Reply #225 on: January 15, 2011, 10:17:46 am »
additional session security will be implemented for admin cp to prevent a leaked session/hijacked admin account from causing damage without going through the secondary authentication.
That's nice. How about protecting your users from XSS?
For now basic auth will do, it'll be improved later.
Will it, now. Do you realize that you just offered to put yet another a band-aid fix on top of a band-aid fix that doesn't fully solve the problem?
« Last Edit: January 15, 2011, 07:11:28 pm by Pi »
"we did farts.  now we do sperm.  we are cutting edge." — Theo DeRaadt

Ben

  • *
  • Posts: 47
  • E-points: +6/-9
  • smelly vaginahead extraordinare
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #226 on: January 15, 2011, 02:40:45 pm »
Honestly Yak, I don't even get why you bother with FA anymore. The whole operation seems to be bugged on so many levels, that it just seems like a criminal waste of time to even bother with the site. This isn't to say you're completely free of liability here, but unlike Dragoneer, you can jump ship. What on earth is keeping you on the staff?

Eevee

  • VAPOREONWARE
  • Cabalistic Fuckhead
  • *
  • Posts: 48
  • E-points: +8/-0
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #227 on: January 15, 2011, 06:58:41 pm »
and additional session security will be implemented for admin cp to prevent a leaked session/hijacked admin account from causing damage without going through the secondary authentication. For now basic auth will do, it'll be improved later.

Will be implemented?  This attack was a month ago now; why isn't it long since implemented?  You still have plenty of other holes.  Stop taking this lightly.

By the way, I believe your basic auth can be trivially circumvented at least two ways—one obscure but simple, the other well-known but tricky.

Arche Kruz

  • CREEPY FURRY AVATAR
  • *
  • Posts: 64
  • E-points: +6/-2
  • Walküre
    • View Profile
    • Arche Kruz on Tumblr
Re: FA admin account compromised (yet again)
« Reply #228 on: January 16, 2011, 10:46:54 am »
Honestly Yak, I don't even get why you bother with FA anymore. The whole operation seems to be bugged on so many levels, that it just seems like a criminal waste of time to even bother with the site. This isn't to say you're completely free of liability here, but unlike Dragoneer, you can jump ship. What on earth is keeping you on the staff?

He wants all the laudations and the elevated community status while doing the least amount of work.

Fiz

  • nice
  • Cabalistic Fuckhead
  • *
  • Posts: 94
  • E-points: +13/-1
  • no stop
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #229 on: January 16, 2011, 03:37:16 pm »
He wants all the laudations and the elevated community status while doing the least amount of work.

Naw, that's not Yak. He doesn't say enough of anything to warrant that. That is more of Dragoneer's thing.

Most of the tech staff on FA really keep quiet. For good reason, really. If they talked more, people would remember "Hey! The site has coders!".
pee

a pigeon

  • Cabalistic Fuckhead
  • ***
  • Posts: 352
  • E-points: +35/-1
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #230 on: January 17, 2011, 04:47:17 pm »
http://www.furaffinity.net/system/sql.sys

http://pastebin.com/6XWucRUF

Someone posted that link on lulz.  Apparently one ought to block random requests to things like that and its credentials are bad.
then he hent that noble prince by the hand,
and said "welcome my soueraigne King HENERY!
chalenge thy Herytage and thy Land,
that thine owne is, and thine shall bee."

Pi

  • POOR IMPULSE CONTROL
  • Postcount ate Whippany, NJ
  • ****
  • Posts: 614
  • E-points: +40/-10
  • <blink>yes hello</blink>
    • View Profile
    • Clan Spum userpage
Re: FA admin account compromised (yet again)
« Reply #231 on: January 17, 2011, 05:19:50 pm »
Code: [Select]
$sql->server   = '192.168.1.1';
$sql->user     = 'furaffinity';
$sql->password = 'kayWrolv~quoles6';

...
are these...
are these the fucking PRODUCTION CREDENTIALS? Holy jesus fuck, this shouldn't ever be anywhere near the web root. What in the fklasd;glkjsadlg
"we did farts.  now we do sperm.  we are cutting edge." — Theo DeRaadt

Freehaven

  • LOLS AND DONGS WHOLESALE
  • ***
  • Posts: 323
  • E-points: +12/-28
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #232 on: January 17, 2011, 06:01:46 pm »
See, between this and the whole "We're redesigning the site, honest to God!" crap, I have no faith in Dragoneer to actually fix the site.

Pi

  • POOR IMPULSE CONTROL
  • Postcount ate Whippany, NJ
  • ****
  • Posts: 614
  • E-points: +40/-10
  • <blink>yes hello</blink>
    • View Profile
    • Clan Spum userpage
Re: FA admin account compromised (yet again)
« Reply #233 on: January 17, 2011, 06:22:16 pm »
Apparently /functions.sys is also sitting out there. These files just shouldn't be sitting around accessible to the whole world. What in the fuck are they smoking over there?
"we did farts.  now we do sperm.  we are cutting edge." — Theo DeRaadt

Ben

  • *
  • Posts: 47
  • E-points: +6/-9
  • smelly vaginahead extraordinare
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #234 on: January 17, 2011, 06:29:06 pm »
Could an explanation of the seriousness be explained for people who probably don't quite get it? It would probably be most helpful.

ProvincialTwit

  • Abuse Dept.
  • Postcount ate Whippany, NJ
  • ****
  • Posts: 774
  • E-points: +72/-33
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #235 on: January 17, 2011, 06:33:22 pm »
That's the username and password information that the website uses to read (and presumably write) data to the database.


Pi

  • POOR IMPULSE CONTROL
  • Postcount ate Whippany, NJ
  • ****
  • Posts: 614
  • E-points: +40/-10
  • <blink>yes hello</blink>
    • View Profile
    • Clan Spum userpage
Re: FA admin account compromised (yet again)
« Reply #236 on: January 17, 2011, 06:35:33 pm »
Could an explanation of the seriousness be explained for people who probably don't quite get it? It would probably be most helpful.
FA's database password is now a matter of public record. They left it in a publicly visible location. This is an such amateurish and shortsighted mistake that I am reduced to staring at my screen and frowning.
"we did farts.  now we do sperm.  we are cutting edge." — Theo DeRaadt

Freehaven

  • LOLS AND DONGS WHOLESALE
  • ***
  • Posts: 323
  • E-points: +12/-28
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #237 on: January 17, 2011, 06:38:29 pm »
FA's database password is now a matter of public record.

In before even more hacking.

loki

  • **
  • Posts: 125
  • E-points: +2/-2
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #238 on: January 17, 2011, 06:54:58 pm »
Apparently /functions.sys is also sitting out there. These files just shouldn't be sitting around accessible to the whole world. What in the fuck are they smoking over there?

I like the SHA1 and MD5 hashes:

Code: [Select]
function _encrypt($string)
{
$first = crypt($string, '$2a$07$'.sha1('d67c5cbf5b01c9f91932e3b8def5e5f8').'$');
$final = sha1($first);

return $final;
}


//
// Part of the newer authentication system
//
//
function _password_hash($password, $salt)
{
$static_salt = md5('g>m$`w6;8+BL/(p7`dvn+$n2mtjU7}3`');
return hash('whirlpool', $salt.md5($password).$static_salt);
}


I don't know much about how those PHP functions work but doesn't knowing the salt allow you to more easily brute force/dictionary attack those passwords?

Edit:

Looks like they exposed SQL tables in functions.sys as well. Hooray!

Code: [Select]
$query = 'INSERT INTO messagecenter_comments_submission VALUES ('.$target_id.', '.$comment_id.')';
$sql->query($query, 'send subm. comment notification', __FILE__);

Edit2:

More exposed files:

http://www.furaffinity.net/system/header.sys
http://www.furaffinity.net/system/end.sys

That hard-coded nesting function is still there too, unchanged:

Code: [Select]
function _nest($newnestid, $nestswitch, $rowid, $table='comments_submission')
...

Jim Demintia

  • Postcount ate Whippany, NJ
  • ****
  • Posts: 628
  • E-points: +24/-6
  • Deflator Mouse
    • View Profile
Re: FA admin account compromised (yet again)
« Reply #239 on: January 17, 2011, 07:13:12 pm »
Between this, the money issues, and, well, everything else I'd say their days are numbered but that goddamn site is unkillable. Dragoneer will somehow stumble through this, I'm sure.

That and if they really were about to go offline due to lack of funds some dumb white trash furfag would offer up their tax refund or something. They'll never face a financial apocalypse.
Can it be this sad design
Could be the very same
A wooly man without a face
And a beast without a name