KUSABA VULNERABILITY (72)

1 Name: serv : 2008-10-09 20:42 ID:p0Jgjy3k [Del]

A SERIOUS SECURITY VULNERBILITY HAS BEED DISCOVERED AND HAS BEEN USED TO CRIPPLE 711CHAN, 99CHAN, ASSCHAN, AMONG OTHERS.

ALLOWS REMOTE LINUX COMMAND EXECUTION

http://pastebin.com/m13fd6ab0

DELETE OR RENAME AFFECTED FILES IMMEDIATELY!!!!!!!!

2 Name: anon1451 : 2008-10-09 20:44 ID:vv8b7m1A [Del]

FFFFFFFFFFFFFFFFFFUUUUUUUUUUUUUUUUUUUUUUUUUUU-

3 Name: serv : 2008-10-09 20:52 ID:p0Jgjy3k [Del]

4 Name: Anonymous : 2008-10-09 22:14 ID:Heaven [Del]

that is too funny.

5 Name: Eleo!EhVtXXdTd6 : 2008-10-09 23:06 ID:3aJNMgFW [Del]

That's awesome.

6 Name: Anonymous : 2008-10-10 07:24 ID:Heaven [Del]

Best thing to happen to the *chan scene in years.

It's about time all the shitty *chans get wiped out.

Good luck trying to patch it up, Serv.

7 Name: Anonymous : 2008-10-10 07:25 ID:Heaven [Del]

8 Name: serv : 2008-10-10 07:54 ID:HLRGG9o+ [Del]

good luck trying to take me out.

I did what a good admin would do.

I shut the all my image boards off from the public then disabled the affected files.

9 Name: serv : 2008-10-10 08:05 ID:HLRGG9o+ [Del]

Also I agree that the shitty *chans need to be wiped out. They are overcrowding the imageboard market.

As I see it, the age of all encompassing *chans has ended.
It is now the age of niche *chans.

also new exploit: http://www.milw0rm.com/exploits/6711

10 Name: Anonymous : 2008-10-10 08:17 ID:Heaven [Del]

>>9
Serv says:

>Also I agree that the shitty *chans need to be wiped out. They are overcrowding the imageboard market.

Let me pinpoint that for you all

>the shitty *chans need to be wiped out.

11 Name: Anonymous : 2008-10-10 10:10 ID:2V4VzLqA [Del]

FINALLY!

Awesome news.

Please, no one release patches for this. I know Trevor won't.

Why am I not surprised to see januszeal's name on that log? That faggot's name is attached to every single "i am a *chan h4x0r lulz" activity.

12 Name: Anonymous : 2008-10-10 10:22 ID:PJ6QT3L/ [Del]

So, the question is why are the ones who are on the list, well, on the list?

A large number of them are ones that are never visited anyway, so I don't see why they got attacked when it effectively does nothing to them.

It's frankly nice to see img.pushthenet.com go down the shithole, but I'm not entirely sure why he bothered with some of the other ones.

So, the load_receiver.php exploit has a fix, but it's not looking like paint.php does. Anyone care to humor me?

13 Name: Anonymous : 2008-10-10 10:25 ID:Heaven [Del]

>>12
Some people have figured out a fix already (on both of them), but to protect the world from moar shitty *chans the code is super top sekrat.

14 Name: Anonymous : 2008-10-10 10:31 ID:PJ6QT3L/ [Del]

>>13

That's kinda unfair on the genuinely good chans running kusaba (lol, I'm struggling not to laugh)

Sites like paintchan are genuinely pretty nice, so I'm hoping somehow they'll at least hear about this fix.

>>11
lol, was going to say the same thing myself.

ALSO, SRSLY.

WHY DIDN'T THAT SKIDDIE TAKE DOWN THE BOARD FULL OF FURRIES.

15 Name: Anonymous : 2008-10-10 10:37 ID:Heaven [Del]

Why the fuck hasn't anyone used this to down PushTheNet?

16 Name: Anonymous : 2008-10-10 10:41 ID:PJ6QT3L/ [Del]

>>15

It's on the list, but apparently the skiddie who found the exploit has decided pushthenet isn't worth his time. Probably true tbh :P

17 Name: Anonymous : 2008-10-10 11:35 ID:Heaven [Del]

>>16
No, I mean, he hacked into them but he didn't do anything malicious.

Here's mod logs from http://tehsausage.com/paste/img-pushthenet

(read backwards)

Time User Action
08/10/08(Wed)18:01 WHY DO YOU HATE ME Logged in
08/10/08(Wed)18:00 Added staff member - Administrator: WHY DO YOU HATE ME
08/10/08(Wed)12:20 Tahko Ran cleanup
08/10/08(Wed)12:18 Tahko Logged in
08/10/08(Wed)12:04 Tahko Deleted post #11368 - /nm/
08/10/08(Wed)11:43 Tahko Modposted #11366 in /nm/ with flags: S.
08/10/08(Wed)11:38 Tahko Unstickied thread #11325 - /nm/
08/10/08(Wed)11:37 Tahko Logged in
08/10/08(Wed)09:28 Tahko Logged in
08/10/08(Wed)09:18 rommel Deleted post #11364 - /nm/
08/10/08(Wed)09:16 rommel Deleted staff member: asdf
08/10/08(Wed)09:16 rommel Added staff member - Administrator: asdf
08/10/08(Wed)09:16 Tahko Deleted staff member: Sausage
08/10/08(Wed)09:15 Tahko Logged in
08/10/08(Wed)09:08 rommel Logged in
08/10/08(Wed)08:27 Sausage Modposted #11364 in /nm/ with flags: DN.
08/10/08(Wed)08:20 Sausage Viewed disk space used
08/10/08(Wed)08:19 Sausage Logged in
08/10/08(Wed)08:18 Added staff member - Administrator: Sausage

18 Name: Anonymous : 2008-10-10 15:55 ID:vuPgLzji [Del]

Serissas site was taken down with it. lol. That's what they get for not knowing how to code.

19 Name: oh : 2008-10-10 18:20 ID:CrzzQsZy [Del]

>>18
Another ignorant moron who doesn't know what he's talking about. The vulnerability was discovered in kusaba 1.0.4 due to a bug in tee's code. It had nothing to do with Serissa. I've taken the site down to patch the security issues.

20 Name: Anonymous : 2008-10-10 18:51 ID:XKTuYgT8 [Del]

>>19
If you had any shred of decency left, you would just keep Serissa's site down.

Let Trevorchan die, please.

21 Name: Sausage : 2008-10-10 19:04 ID:ewqvODKS [Del]

Osrry. All those random sites were just me checking what % might be affected, and boredom.

(numbers are the order checked, giving the first about 50%)

22 Name: Anonymous : 2008-10-11 02:19 ID:Heaven [Del]

>>21
Why not take Img.Pushthenet.com down for good?

The internet would be a much better place.

Name: Link:
Leave these fields empty (spam trap):
More options...
Verification: