GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   CCBill.com multiple vulnerabilities (https://gfy.com/showthread.php?t=982701)

CYF 08-16-2010 05:27 PM

CCBill.com multiple vulnerabilities
 
Found this on the full disclosure mailing list:

Quote:

We want to warn you about security vulnerabilities in CCBILL.COM
Internet billing service.

CCBill is an Internet billing service. Established in 1998, the company
provides third-party billing, or turn-key solutions, for e-Merchants
requiring payments by way of credit card, debit card, or e-check,
European Debit/Direct Pay, and telephone payment.

Since Ccbill is a privately held company little is known about it's
finances however it is estimated that more than a billion dollars per
year in credit card charges are processed through Ccbill in the us and
abroad.

Time Table:
# 20/07/2010 We have found multiple Blind SQL injections.

# 30/07/2010 - Vendor notified. / no response
# 03/08/2010 - Vendor notified. / no response
# 10/08/2010 - Vendor notified. / no response

CCBILL.COM vulnerability:

Multiple blind SQL injections

It's possible to get all customers FULL personal details, server admins
etc...

Also is possible to read any file from ccbill.com and write to this
server too.

JPG sample tables proof:
http://www.ariko-security.com/images/ccbill_proof1.jpg

Credit:
# Discoverd By: MG / Ariko-Security 2010
# http://advisories.ariko-security.com...nstwa_719.html


CYF 08-16-2010 06:10 PM

It's possible to get all customers FULL personal details, server admins
etc...

Also is possible to read any file from ccbill.com and write to this
server too.


Pretty shitty vulnerability if you ask me.

Ethersync 08-16-2010 06:16 PM

Jesus, that is one hell of an vulnerability.

woj 08-16-2010 06:17 PM

serious stuff...

# 30/07/2010 - Vendor notified. / no response
# 03/08/2010 - Vendor notified. / no response
# 10/08/2010 - Vendor notified. / no response

does that mean that it hasn't been patched up yet?

Ethersync 08-16-2010 06:18 PM

Quote:

Originally Posted by woj (Post 17420389)
serious stuff...

# 30/07/2010 - Vendor notified. / no response
# 03/08/2010 - Vendor notified. / no response
# 10/08/2010 - Vendor notified. / no response

does that mean that it hasn't been patched up yet?

Most likely... :2 cents:

NetHorse 08-16-2010 06:19 PM

Yeah, who knows...

I think a lot would agree that CCBILL needs to revamp EVERYTHING from the ground up. Especially considering they're the single biggest processor in adult. A lot of concerns have been brought up in the last 2-3 years, zero changes have happened though.

ladida 08-16-2010 06:20 PM

They had so many, they stopped caring :)

DWB 08-16-2010 06:24 PM

In before the lock?

Get on it CCbill.

BFT3K 08-16-2010 06:33 PM

I am not defending CCBill here, and hopefully they have read this post, and are immediately working to correct these issues.

But I want to add, for whatever its worth, it appears EVERYTHING currently on the web is insecure nowadays - from major banks, to EVERY social network, to almost EVERY method of online processing, all the way up to Top Secret classified military documents!

It really is the fucking wild wild west out here...

TheSenator 08-16-2010 06:37 PM

I bet this thread is gonna be locked down and thrown away.

myneid 08-16-2010 06:47 PM

it is very serious business for any service provider or merchant to have ANY vulnerabilities as per pci dss.
every hole needs to be filled in somehow and quarterly scans are required.

now i have not verified this myself, but i'm guessing that its bogus.

BittieBucks Eric 08-16-2010 06:54 PM

Quote:

Originally Posted by NetHorse (Post 17420399)
Yeah, who knows...

I think a lot would agree that CCBILL needs to revamp EVERYTHING from the ground up. Especially considering they're the single biggest processor in adult. A lot of concerns have been brought up in the last 2-3 years, zero changes have happened though.

Any idea how many bugs and vulnerabilities they'd create if they'd rebuild everything from the ground up?

CYF 08-16-2010 07:00 PM

Quote:

Originally Posted by myneid (Post 17420454)
it is very serious business for any service provider or merchant to have ANY vulnerabilities as per pci dss.
every hole needs to be filled in somehow and quarterly scans are required.

now i have not verified this myself, but i'm guessing that its bogus.

bogus? Why would you think that?

Ethersync 08-16-2010 07:04 PM

Quote:

Originally Posted by myneid (Post 17420454)
now i have not verified this myself, but i'm guessing that its bogus.

Are all these other exploits they found bogus too?

http://www.ariko-security.com/index-7.html

SwirlsGirl 08-16-2010 07:28 PM

Hell I am no programmer, but I can attest that it appears that if they are not guilty of any fraud them selves, then some one has hacked them and been able to do a lot of things that have caused many webmasters to question the integrity of the data.

Of course for the past year and a half all ccbill has done was assure everyone that what they were seeing (Bizarre to say the least stats anomalies) was their imagination, and have there schills come into gfy and attack anyone raising serious questions!

Even if this post is found to be true, the majority of the industry is so brain washed and gullible, they will not believe or care that they could have been getting the fuzzy end of the lolipop

CCBill Paul 08-16-2010 07:46 PM

We are and have been looking into this.

SwirlsGirl 08-16-2010 08:00 PM

Quote:

Originally Posted by CCBill Paul (Post 17420532)
We are and have been looking into this.

Classic, but you would have others think I am just starting drama, tell me If this is found out to be true, will you come back in and apologize as an honorable person would?

I mean you guys at ccbill are so honorable, professional, and courteous. Something tells me not to hold my breath....


OH I KNOW.......................

ITS JUST A BUG!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! LOL

SwirlsGirl 08-16-2010 08:06 PM

Makes you start to wonder about some of those zero sales days really being zero sales days, especially when your back up processors are having sales flurries

:2 cents: :thumbsup

BFT3K 08-16-2010 08:45 PM

http://www.hockeydrunk.com/wp-conten...ts_or_gtfo.jpg

mmcfadden 08-16-2010 08:47 PM

Quote:

Originally Posted by CCBill Paul (Post 17420532)
We are and have been looking into this.

Lmk when all is good ;). Lol

NetHorse 08-16-2010 09:07 PM

Quote:

Originally Posted by BittieBucks Eric (Post 17420462)
Any idea how many bugs and vulnerabilities they'd create if they'd rebuild everything from the ground up?

Good point. :thumbsup Not really sure what needs to be done, but something clearly needs addressing.

100s of affiliates/program owners have been creating thread after thread all with similar issues. Making a statement, "Everything is fine on our end" doesn't seem to be an amicable solution anymore.

Loki 08-16-2010 09:07 PM

only thing I find odd is the 'proof' half a jpg screenshot with red underlines meaning "spelling errors" in most auto spellcheck applications....

and yet on the site that found the 'exploit' the bulk of their other finds have full text files as 'proof' (even with other msql exploit / injections)

I did notice that CCBILL is aware of the issue, but I still find the 'proof' a bit odd

-Loki-

The Ghost 08-16-2010 09:21 PM

Thread bookmarked.

elitelist 08-16-2010 10:22 PM

Quote:

Originally Posted by Loki (Post 17420684)
only thing I find odd is the 'proof' half a jpg screenshot with red underlines meaning "spelling errors" in most auto spellcheck applications....

and yet on the site that found the 'exploit' the bulk of their other finds have full text files as 'proof' (even with other msql exploit / injections)

I did notice that CCBILL is aware of the issue, but I still find the 'proof' a bit odd

-Loki-

Concatenated strings are not vocabulary.

I can also promise you that ccbill is owned beyond the owners.

rowan 08-16-2010 11:18 PM

http://thsrv.com/hl/http://testingbl...bby-tables.jpg

CYF 08-16-2010 11:19 PM

Quote:

Originally Posted by rowan (Post 17420805)

I love that one :thumbsup

MrDeiz 08-16-2010 11:25 PM

Quote:

Originally Posted by CCBill Paul (Post 17420532)
We are and have been looking into this.

it doesn't make any sense = it's senseless :2 cents:

LeRoy 08-16-2010 11:30 PM

Sounds like there's a few issues to deal with this week.

ugh!

DWB 08-17-2010 02:19 AM

Quote:

Originally Posted by myneid (Post 17420454)
every hole needs to be filled


http://languagejunkie.com/wp-content...id-michael.jpg

Beerbar 08-17-2010 09:01 AM

Anything more from CCBill?

NetHorse 08-17-2010 12:56 PM

If this is a real concern it should be forwarded to PCI. Request that a SAS 70 report be created.

Ethersync 08-17-2010 01:01 PM

Not a new problem? From March 13th, 2009: http://blog.rstcenter.com/2009/03/13...-in-ccbillcom/

closer 08-17-2010 01:23 PM

Any site can be hacked/cracked,

a financial/banking site should be held up to much higher security standards, as this could potentially give yet another HUGE blow to the adult industry as a whole, which is already at its weakest point to date, if this becomes a CNN item, we're not talking facebook here.

In the end, the only real opinion that should matter in such cases is how fast that hacked site fixes the backdoors.

It's good to read that CCBill is looking into it and hope they'll update us with any news.

CYF 08-17-2010 04:03 PM

Quote:

Originally Posted by Ethersync (Post 17422269)
Not a new problem? From March 13th, 2009: http://blog.rstcenter.com/2009/03/13...-in-ccbillcom/

I think this is a separate issue.

CYF 08-17-2010 05:58 PM

bump for a serious issue.

Shap 08-17-2010 07:00 PM

Looking forward to hearing the reply.

cambaby 08-17-2010 07:10 PM

F.U.D.

Leave CCBill alone, NATS is shit

CYF 08-17-2010 07:11 PM

Quote:

Originally Posted by cambaby (Post 17423141)
F.U.D.

Leave CCBill alone, NATS is shit

So this isn't a serious vulnerability? How do you figure?

cambaby 08-17-2010 07:29 PM

Quote:

Originally Posted by CYF (Post 17423142)
So this isn't a serious vulnerability? How do you figure?

There is a huge difference between "vulnerability" and actual cases of hacking. Every piece of software is "vulnerable".

Most likely you have to get social hacked into giving up some piece of information and then be on a certain domain at a certain time located at x,y gps coordinates and standing on your head sipping a glass of red wine while flatulating to actually exploit shit.

Shap 08-17-2010 07:32 PM

Quote:

Originally Posted by cambaby (Post 17423141)
F.U.D.

Leave CCBill alone, NATS is shit

How does this have anything to do with Nats? It's one thing to discredit the claim it's another to bring in another company that has nothing to do with this topic.

ladida 08-17-2010 07:35 PM

Quote:

Originally Posted by cambaby (Post 17423161)
There is a huge difference between "vulnerability" and actual cases of hacking. Every piece of software is "vulnerable".

Most likely you have to get social hacked into giving up some piece of information and then be on a certain domain at a certain time located at x,y gps coordinates and standing on your head sipping a glass of red wine while flatulating to actually exploit shit.

ROFL. god you're clueless :1orglaugh

cambaby 08-17-2010 07:49 PM

...and out come the people who get paid to bash CCBill

Shap 08-17-2010 07:55 PM

Quote:

Originally Posted by cambaby (Post 17423195)
...and out come the people who get paid to bash CCBill

LOL that really shows how clueless you are. How am I paid to bash Ccbill? I've used them for more than 10 years now.

CYF 08-17-2010 08:02 PM

Quote:

Originally Posted by cambaby (Post 17423161)
There is a huge difference between "vulnerability" and actual cases of hacking. Every piece of software is "vulnerable".

Most likely you have to get social hacked into giving up some piece of information and then be on a certain domain at a certain time located at x,y gps coordinates and standing on your head sipping a glass of red wine while flatulating to actually exploit shit.

that's pretty clueless dude :1orglaugh

and no, I'm not paid to bash CCBill.

rowan 08-17-2010 08:24 PM

Quote:

Originally Posted by Ethersync (Post 17422269)
Not a new problem? From March 13th, 2009: http://blog.rstcenter.com/2009/03/13...-in-ccbillcom/

This one looks like an SQL injection. See the cartoon I posted. Unbelievable that a multi-million dollar CC processing company would not sanitize input data to prevent what appears to be a relatively simple attack... especially on a non login required public knowledgebase. :helpme:

CYF 08-18-2010 06:23 PM

Quote:

Originally Posted by rowan (Post 17423233)
This one looks like an SQL injection. See the cartoon I posted. Unbelievable that a multi-million dollar CC processing company would not sanitize input data to prevent what appears to be a relatively simple attack... especially on a non login required public knowledgebase. :helpme:

:2 cents:

NinjaSteve 08-18-2010 08:52 PM

Hopefully ccbill will finish looking into it and then come in and say "that shit is bananas!"

CYF 08-18-2010 09:32 PM

Quote:

Originally Posted by NinjaSteve (Post 17425942)
Hopefully ccbill will finish looking into it and then come in and say "that shit is bananas!"

somehow I doubt it.

Kelli58 08-18-2010 09:52 PM

So bashing each other aside, did anyone from CCBill address the CCBill security issues yet?

The Porn Nerd 08-18-2010 10:23 PM

Quote:

Originally Posted by Kelli58 (Post 17426031)
So bashing each other aside, did anyone from CCBill address the CCBill security issues yet?

That would be a "no".


All times are GMT -7. The time now is 03:53 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123