GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   CCBill.com multiple vulnerabilities (https://gfy.com/showthread.php?t=982701)

ladida 08-17-2010 07:35 PM

Quote:

Originally Posted by cambaby (Post 17423161)
There is a huge difference between "vulnerability" and actual cases of hacking. Every piece of software is "vulnerable".

Most likely you have to get social hacked into giving up some piece of information and then be on a certain domain at a certain time located at x,y gps coordinates and standing on your head sipping a glass of red wine while flatulating to actually exploit shit.

ROFL. god you're clueless :1orglaugh

cambaby 08-17-2010 07:49 PM

...and out come the people who get paid to bash CCBill

Shap 08-17-2010 07:55 PM

Quote:

Originally Posted by cambaby (Post 17423195)
...and out come the people who get paid to bash CCBill

LOL that really shows how clueless you are. How am I paid to bash Ccbill? I've used them for more than 10 years now.

CYF 08-17-2010 08:02 PM

Quote:

Originally Posted by cambaby (Post 17423161)
There is a huge difference between "vulnerability" and actual cases of hacking. Every piece of software is "vulnerable".

Most likely you have to get social hacked into giving up some piece of information and then be on a certain domain at a certain time located at x,y gps coordinates and standing on your head sipping a glass of red wine while flatulating to actually exploit shit.

that's pretty clueless dude :1orglaugh

and no, I'm not paid to bash CCBill.

rowan 08-17-2010 08:24 PM

Quote:

Originally Posted by Ethersync (Post 17422269)
Not a new problem? From March 13th, 2009: http://blog.rstcenter.com/2009/03/13...-in-ccbillcom/

This one looks like an SQL injection. See the cartoon I posted. Unbelievable that a multi-million dollar CC processing company would not sanitize input data to prevent what appears to be a relatively simple attack... especially on a non login required public knowledgebase. :helpme:

CYF 08-18-2010 06:23 PM

Quote:

Originally Posted by rowan (Post 17423233)
This one looks like an SQL injection. See the cartoon I posted. Unbelievable that a multi-million dollar CC processing company would not sanitize input data to prevent what appears to be a relatively simple attack... especially on a non login required public knowledgebase. :helpme:

:2 cents:

NinjaSteve 08-18-2010 08:52 PM

Hopefully ccbill will finish looking into it and then come in and say "that shit is bananas!"

CYF 08-18-2010 09:32 PM

Quote:

Originally Posted by NinjaSteve (Post 17425942)
Hopefully ccbill will finish looking into it and then come in and say "that shit is bananas!"

somehow I doubt it.

Kelli58 08-18-2010 09:52 PM

So bashing each other aside, did anyone from CCBill address the CCBill security issues yet?

The Porn Nerd 08-18-2010 10:23 PM

Quote:

Originally Posted by Kelli58 (Post 17426031)
So bashing each other aside, did anyone from CCBill address the CCBill security issues yet?

That would be a "no".

The Porn Nerd 08-18-2010 10:35 PM

FIDDY CCBILL VULNERABILITIES!!!

I can't believe I beat Woj to the punch. WooHoo! Ahem.

CYF 08-19-2010 11:46 AM

still waiting for a ccbill fix.

candyflip 08-19-2010 12:04 PM

They are too busy counting their monies.

V_RocKs 08-24-2010 11:52 AM

CCBILL has had this problem for years... Why change anything now?

mlove 08-24-2010 11:55 AM

Quote:

Originally Posted by BFT3K (Post 17420433)
I am not defending CCBill here, and hopefully they have read this post, and are immediately working to correct these issues.

But I want to add, for whatever its worth, it appears EVERYTHING currently on the web is insecure nowadays - from major banks, to EVERY social network, to almost EVERY method of online processing, all the way up to Top Secret classified military documents!

It really is the fucking wild wild west out here...

Not everything.

PHP Code:

<?php echo "hello."?>

Hack my php script.

NikKay 08-25-2010 11:23 AM

Quote:

Originally Posted by DirtyWhiteBoy (Post 17420918)

Awesome.

V_RocKs 08-25-2010 05:39 PM

Nice script

Axzar 08-25-2010 06:32 PM

Get an alternate merchant account already. Quit paying 15% or more. See Sig Below. Free to Apply.

DVTimes 08-25-2010 06:41 PM

Quote:

Originally Posted by CCBill Paul (Post 17420532)
We are and have been looking into this.

cool stuff

hope its fixed soon

Mock NyaMout 08-25-2010 11:23 PM

I got the answer:thumbsup

CYF 09-06-2010 09:19 PM

still no reply?

SallyRand 09-06-2010 09:43 PM

Quote:

Originally Posted by CCBill Paul (Post 17420532)
We are and have been looking into this.

Paul, don't "LOOK INTO IT", FUCKING FIX IT!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

;)

Sally.

CYF 09-10-2010 12:33 PM

still no reply?

Socks 09-10-2010 12:43 PM

At one point in time I was aware of how to create logins and passwords on any CCBill site, I believe it worked like a charm. Was years ago though.

May-Netpay 09-16-2010 06:46 AM

why using CCbill where you can use NetPay international ..a leader in providing on-line, real-time payment processing solutions in a solid, secure and reliable manner.

not only secure, but has advanced technology and new payment solution to European customers.

contact me for info.
May

MMarko 09-16-2010 07:31 AM

Again only one who is losing money are affiliates. CCbill gets it's cut, sponsor too. Also problems with CCbill sales started around those dates mentioned in report...

MMarko 09-16-2010 07:35 AM

Quote:

Originally Posted by closer (Post 17422331)
a financial/banking site should be held up to much higher security standard

if these vulnerabilities are true, then ccbill security is below ANY standard

k0nr4d 09-16-2010 07:38 AM

Quote:

Originally Posted by May-Netpay (Post 17508412)
why using CCbill where you can use NetPay international ..a leader in providing on-line, real-time payment processing solutions in a solid, secure and reliable manner.

not only secure, but has advanced technology and new payment solution to European customers.

contact me for info.
May

Classy Bump...

CYF 10-14-2010 10:47 AM

has this been fixed yet?

signupdamnit 10-14-2010 11:01 AM

Quote:

Originally Posted by CYF (Post 17606589)
has this been fixed yet?

I hope so. It would really suck to wake up one day and hear Visa or someone has shut down CCbill for "certain program deficiencies". :(

CYF 10-14-2010 09:20 PM

Quote:

Originally Posted by signupdamnit (Post 17606648)
I hope so. It would really suck to wake up one day and hear Visa or someone has shut down CCbill for "certain program deficiencies". :(

somehow I don't think it's fixed yet :disgust

Zyber 10-15-2010 12:07 AM

Come on guys. Give them some time to fix it.

In 2005 I complained to CCBill that their website was a pain in the ass and not user-friendly to use. Now 5 years later look how much (or nothing) has changed. The website still looks like Web 1.0. However, the CCBill private jet sure does look fine.

Epoch is also weak code. Just try to sign up as an affiliate and notice the bugs in the sign-up form. The programmer didn't know (or was too lazy) to dynamically fill in the SELECT boxes or the RADIO buttons. They lose their values when the form is recreated during the field validation process. With such newbie errors present one can only fear that the same programmer has been to lazy to sanitize inputs other places in the code, thus allowing for SQL injections.

Davy 10-15-2010 05:09 AM

The website looks bogus. If it was possible to write to CCBill's server, the easiest way to alert CCBill about the problem would be to deface their website.

HomerSimpson 10-15-2010 05:43 AM

Quote:

Originally Posted by Zyber (Post 17608729)
Come on guys. Give them some time to fix it.

In 2005 I complained to CCBill that their website was a pain in the ass and not user-friendly to use. Now 5 years later look how much (or nothing) has changed. The website still looks like Web 1.0. However, the CCBill private jet sure does look fine.

Epoch is also weak code. Just try to sign up as an affiliate and notice the bugs in the sign-up form. The programmer didn't know (or was too lazy) to dynamically fill in the SELECT boxes or the RADIO buttons. They lose their values when the form is recreated during the field validation process. With such newbie errors present one can only fear that the same programmer has been to lazy to sanitize inputs other places in the code, thus allowing for SQL injections.

yes, their UI is pure SHIT!
for a few thousand dollars they could re-design the whole site and have
a new fresh look that would pay for it self in matter of days!

candyflip 10-15-2010 06:01 AM

Of course it isn't fixed. This is CCBill we're talking about.

As I said up top, they're too busy counting their monies to worry about real issues.

buyandsell 10-15-2010 07:59 AM

ccbill still getting hacked eh

CyberHustler 10-15-2010 08:03 AM

CCBill, why get this topic locked?
https://gfy.com/showthread.php?t=992256

blackmonsters 10-15-2010 08:10 AM

PHP for the WIN.....




....for hackers of course.



LOL! :1orglaugh

CYF 10-15-2010 11:08 AM

Quote:

Originally Posted by Davy (Post 17609103)
The website looks bogus. If it was possible to write to CCBill's server, the easiest way to alert CCBill about the problem would be to deface their website.

it's not bogus.

RonC 10-15-2010 11:42 AM

Quote:

Originally Posted by Davy (Post 17609103)
The website looks bogus. If it was possible to write to CCBill's server, the easiest way to alert CCBill about the problem would be to deface their website.


This report was a complete joke. This was just a variation of a Nigerian scam. We contacted the website and they responded via GMAIL if we would "Western Union" them 10k they would tell us what was wrong. LOL They create a fake security page and post stuff and hope companies will pay the blackmail money VIA WESTERN UNION (LOL)

But hey if it is on the Internet it MUST BE TRUE.

End of Story.


Ron C
_________
CEO

CCbill.com
Cavecreek.com


All times are GMT -7. The time now is 04:06 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123