I had
I played it safe and:
Sorry about that folks. It looks like some other big xenforo sites got bit as well!
IMPORTANT: If you created your account on here after12am ET last night, you'll have to do that again. Obv anything posted since then is gone as well.
Special thanks go out to @KGIII and @f33dm3bits who were troubleshooting with me for the past cpl hours!
Rob
Edit: Xenforo info on the patch/fix:
xenforo.com
Edit2: more info: https://github.com/methosiea/xenforo-2-xss
So, the attack chain is basically:
upgrade xenforo on my todo list, and didn't get to it in time. Someone was able to use a new XSS vulnerability to inject code into a site widget. After many mysql queries we found it happened at about 14:06 ET. Also, did not see any exports or ability to do any exports.I played it safe and:
- shut down nginx
- ran any available server software upgrades while things were down
- restored from last night's (12am ET) backup (site files and db)
- ran any available xenforo upgrades
Sorry about that folks. It looks like some other big xenforo sites got bit as well!
IMPORTANT: If you created your account on here after12am ET last night, you'll have to do that again. Obv anything posted since then is gone as well.
Special thanks go out to @KGIII and @f33dm3bits who were troubleshooting with me for the past cpl hours!
Rob
Edit: Xenforo info on the patch/fix:
XenForo 2.3.10 & Add-ons and 2.2.19 Released (Includes Security Fix)
XenForo 2.3.10 Released XenForo 2.3.10 is now available for all licensed customers to download. We strongly recommend that all customers running previous versions of XenForo 2.3 upgrade to this release to benefit from increased stability. In addition to the usual bug fixes, XenForo 2.3.10...
Edit2: more info: https://github.com/methosiea/xenforo-2-xss
So, the attack chain is basically:
- Attacker registers an account
- New post w/ the xss payload - it goes to the queue
- An admin views it, it fires off the xss payload stealing his session
- Attacker creates the malicious widget
Last edited:

