Thats great news ElpieElpie wrote: That vulnerability has already been fixed in the upgrade that we should have out soon.
We are in the final testing stages now.

Moderators: General Support Moderators, General Support Moderators
Thats great news ElpieElpie wrote: That vulnerability has already been fixed in the upgrade that we should have out soon.
We are in the final testing stages now.
need testing and hack-attempt assistance?Elpie wrote: Testing is well underway Leo - hope to have it available for you soon.
Ditto here. I'm on a VPS and haven't had any hack attempts since moving to it, but would be willing to do testing with you.leolam wrote:need testing and hack-attempt assistance?Elpie wrote: Testing is well underway Leo - hope to have it available for you soon.
cheers
Leo
Thanks for this.Elpie wrote: Testing is well underway Leo - hope to have it available for you soon.
Misleading advice.Elpie wrote:Do NOT uninstall the ExtCalendar you have now
Exactly how many Joomla Users have that though???? And even if they do - do they have the knowledge to make a server secure - probably not.If your site is secure, and in my case on your own server,
Incorrect wording and confusing for newbies and people who do not have YOUR knowledge!PhilTaylor-Prazgod wrote:
Misleading advice.
Possibly reword like this:
"Do not use the Joomla Uninstall method in Joomla ADmin for uninstalling extCalendar right now as the would remove your events and they would be lost for ever - HOWEVER YOU MUST remove manually using FTP or SSH the /components/com_extcalandar/ folder and all files below in order to prevent your site getting hacked."
I am simply asking how your rewording from above fits this message. The people who are currently working on this new patch are addressing serious sql-issues and others related to EXT Calendar as well.....Could you shine your light on this as well because it seems that a little bit more is present than you have addressed in your patch if i understand this correct? Please advise becasue i would love to know if i can use your patch you have installed with your 50 or so users or should i uninstall as you suggest in your rewording? Is your patch safe and does it solves the issue?PhilTaylor-Prazgod wrote: Try telling that the the people that got hacked - to the 50+ people that have employed my company to fix their sites after the hackers....
I'm not yelling fire fire fire - Im being real and serious about a real and expanding threat to hacking of 3PD
Maybe if the "more experienced" had advised his customer correctly he would not hack got hacked !!leolam wrote: Client of mine also hacked...nothing wrong with configuration.php but the index.php was replaced......
waiting for the patch.....
cheers
Leo
Not sure if you are counting your self more experienced then me or that you think I am trying to promote my services ? or both. Infact I do this for a living is a fact - I cant change that - and yes I do charge and yes I do make money - get over it - thats my job! - it also means that I am very experienced.Please realise that we (more experienced people) are here to help and protect the users of this fantastic Joomla-product and that we are not in this to play games and use the situation to promote!
may i object to this flame and abuse? I ask you a very descent question, one which is not flaming and one which is very fair question? I asked you if your thread was solving the issue and i made a clarification on the remark. What is wrong with asking if your solution solves it? OPlease advise why you need to be aggresive and abusive?PhilTaylor-Prazgod wrote: @leo
Im not interested in your nit picking personal flaming thread posts - go and find some one else to troll and I'll simply get on with doing what I was doing before you decided to popin.
leolam wrote: Client of mine also hacked...nothing wrong with configuration.php but the index.php was replaced......
waiting for the patch.....
cheers
Leo
thanks you for that...I could reply very easy with a remark that i read somewhere that you just helped 50 of your customers but i won't becasue i just asked a descent question on which i have not yet got an answer. Does your patch solves the issue was the question? If so I am happy and we will apply ity to the customer's site!!Maybe if the "more experienced" had advised his customer correctly he would not hack got hacked !!
Actually they were not customers of mine - but they are now cause they knew where to turn when they were let down by other so called "more experienced"just helped 50 of your customers
completely agree without doubt!PhilTaylor-Prazgod wrote: The fact is, and this thread proves, that there is a lot of people thinking they are qualified to give advice. Even bad advice.
which is without doubt an excellent advise! but:If you have files extcalendar.php, file_upload.php, image_upload.php (or perForms) on your site then you are liable to be hacked if have not taken action to remove, patch, or protect yourself agains a string of automated, self replicating attacks. You are also vunerable if you have taken action based on some incorrect advice (like modifing htaccess files I read somewhere)
You have been warned.
Pershendetje miku imlboccia wrote: I dashur Albi,
can you confirm that using the Calendar version you suggested there are no known security issues?
Të fala (Regards),
Luigi
Simple answer. The patch on my blog has been removed in favour of the pending combined developers re-release of ExtCalendar which I have been aware of for some time. The patch that was available on my site was developed inhouse at speed for a particular customer and fixed all file include vunerabilities in that single file. Since that time other SQL injection and string manipulatiuon issues have been found and the patch removed from my site.Phil,
once again I ask you if your patch which is downloadable from your site solves indefinitely this vulnarability which has been discovered recently? Is it too much asked to give a straight answer to that question which is a fair request? On the bad advise i do concur by the way. the .htaccess remarks are not applicable in this situation and does not solve anything. So in other words if i understand you correct that if I would apply your patch I do not have to fear anymore and i cannot get hacked through the ext.calendar vulnerability any longer? Smiley
Cheers
Thank you for your reply....that was all i asked for in my initial post. On the remainder i will post in private to the known channels. As usual it was my pleasurePhilTaylor-Prazgod wrote:Simple answer. The patch on my blog has been removed in favour of the pending combined developers re-release of ExtCalendar which I have been aware of for some time. The patch that was available on my site was developed inhouse at speed for a particular customer and fixed all file include vunerabilities in that single file. Since that time other SQL injection and string manipulatiuon issues have been found and the patch removed from my site.Phil,
once again I ask you if your patch which is downloadable from your site solves indefinitely this vulnarability which has been discovered recently? Is it too much asked to give a straight answer to that question which is a fair request? On the bad advise i do concur by the way. the .htaccess remarks are not applicable in this situation and does not solve anything. So in other words if i understand you correct that if I would apply your patch I do not have to fear anymore and i cannot get hacked through the ext.calendar vulnerability any longer? Smiley
Cheers
I have been in almost daily touch with Martin Brampton (Ex Mambo Core Lead Developer) and he has been working with the team on securing ExtCalendar. I have offered to promote the official release he and the team of developers will make available soon to my mailing list of over 10,000 Joomla users worldwide (The same list I announced the issues to at the beginning of this week).
Please pardon my ignorance (well, why should you? My wife doesn't). What is a *NIX system???donaldwheaton wrote: I have a website that was defaced through the security hole in the ExtCalendar component and previously with RSGallery. In both defacements, not only did the home page get replaced, but the hacker installed a rootkit. My other security measures limited the rootkit's usefulness, but standard installations would be compromised and most likely be relays for spam or slaves for a DDOS attack. If you have been hacked, or even before you have been hacked, and you're running a *NIX system, I would recommend to install and run a rootkit scanner like chkrootkit or rkhunter and a log analysis program like logwatch. Here are their web site addresses:
donaldwheaton wrote: I have a website that was defaced through the security hole in the ExtCalendar component and previously with RSGallery. In both defacements, not only did the home page get replaced, but the hacker installed a rootkit. My other security measures limited the rootkit's usefulness, but standard installations would be compromised and most likely be relays for spam or slaves for a DDOS attack. If you have been hacked, or even before you have been hacked, and you're running a *NIX system, I would recommend to install and run a rootkit scanner like chkrootkit or rkhunter and a log analysis program like logwatch. Here are their web site addresses:
http://www.chkrootkit.org/
http://www.rootkit.nl/
http://www.logwatch.org/
Hack their memory and removeRobinH wrote: Warning to all visitors to these forums - never get a developer angry at you - the have a very long memory, and tons of RAM to store it in!!!
![]()
![]()
![]()
from what they consider to be a brain// no direct access
defined( '_VALID_MOS' ) or die( 'Restricted access' );
Thanks, appreciate the info. I'm on VPS with full admin authority on the server, running Centos. Will go investigate that rootkit scanner.PhilTaylor-Prazgod wrote: For clarification:
You can only run these tools if you have ssh/telnet access to your server and correct permissions and priviledges to do so. Most normal web hosting accounts will not have this level of access to the servers operating system and scanning for rootkits should only be done by those with full access and permission to the OS files. (After all if you run a rootkit check and find a problem you need the experience or knowledge to know what to do next :-) )
For the regular Joomla user the use of rootkit scanning would not apply.
A *nix ssystem is one based on UNIX or Linux code (redhat, centos, etc...)
Coming soon to a theater near you!!!Buster wrote: Any news on any re-releases?