WHMCS zero-day vulnerability issue

technut

New member
A critical zero-day vulnerability was published today affecting any hosting provider using WHMCS.

WHMCS quickly published a patch here: http://blog.whmcs.com/?t=79427

See below email from WHMCS today.



========================================
WHMCS Security Advisory for 5.x
http://blog.whmcs.com/?t=79427
========================================

WHMCS has released new patches for the 5.2 and 5.1 minor releases. These updates
provide targeted changes to address security concerns with the WHMCS product.
You are highly encouraged to update immediately.

WHMCS has rated these updates as having critical security impacts. Information
on security ratings is available at http://docs.whmcs.com/Security_Levels


== Releases ==
The following patch release versions of WHMCS have been published to address a
specific SQL Injection vulnerability:
v5.2.8
v5.1.10

== Security Issue Information ==

The resolved security issue was publicly disclosed by "localhost" on
October 3rd, 2013.
The vulnerability allows an attacker, who has valid login to the installed
product, to craft a SQL Injection Attack via a specific URL query parameter
against any product page that updates database information.


== Mitigation ==

=== WHMCS Version 5.2 ===

Download and apply the appropriate patch files to protect against these
vulnerabilities.

Patch files for affected versions of the 5.2 series are located on the WHMCS
site as itemized below.

v5.2.8 (full version) - Downloadable from the WHMCS Members Area
v5.2.8 (patch only; for 5.2.7) - http://go.whmcs.com/218/v528_Incremental

To apply a patch, download the files indicated above and replace the files
within your installation.
No upgrade process is required.

=== WHMCS Version 5.1 ===

Download and apply the appropriate patch files to protect against these
vulnerabilities.

Patch files for affected versions of the 5.1 series are located on the WHMCS
site as itemized below.

v5.1.10 (patch only; for 5.1.9) - http://go.whmcs.com/226/v5110_Incremental

To apply a patch, download the files indicated above and replace the files
within your installation.
No upgrade process is required.

========================================

WHMCS Limited
www.whmcs.com

- Members Area: https://www.whmcs.com/members/
- Support: http://www.whmcs.com/support/
- Documentation: http://docs.whmcs.com/
- Community Forums: http://forums.whmcs.com/
 
We disabled our WHMCS until the patch was released - I heard about the issue at about 4pm and the patch was released just after 7pm.
 
Agreed. Considering how widely used WHMCS is in not just the web hosting business but also many other service based providers these things can cause major damage. I am just glad they released a fix in a reasonable timeframe. If it took more than a day or two I would've heavily considered moving to another billing platform.
 
Unfortunately the biggest problem with the software, is that it gets attacked because it's so popular... which also makes it the best part about it.. it's widely recognized.

Regardless, they really should get their auto-update feature perfectly working. However, somehow, that would be exploited too.

So, WHMCS is now becoming the Java of the billing portal industry. But we are all glad that they are patching things as soon as they can, from the time they hear about it.
 
I didnt get affected by this but i disabled my whmcs too for the moment to apply the patch , we dont have to change to another billing system this is a problem every big company have . You need to stay tuned for latest update everytime.
 
I didnt get affected by this but i disabled my whmcs too for the moment to apply the patch , we dont have to change to another billing system this is a problem every big company have . You need to stay tuned for latest update everytime.

Was easy to avoid. Just disable editing of client fields after signup.
 
Unfortunately the biggest problem with the software, is that it gets attacked because it's so popular... which also makes it the best part about it.. it's widely recognized.

Regardless, they really should get their auto-update feature perfectly working. However, somehow, that would be exploited too.

So, WHMCS is now becoming the Java of the billing portal industry. But we are all glad that they are patching things as soon as they can, from the time they hear about it.

They are large which means there is a lot of support for it. This, as you stated, is good and bad. Good, they'll most likely keep developing the product and community members will too. Bad, hackers will keep finding exploits!
 
follow their twitter to be update about critical updates,and recommend to update very fast when a bug found!there are large wide of people which want to test bugs on your sites,after update more than 25 people tried to run this on our website:)
 
WHMCS needs to have their code externally audited. They need to pay Rack911 to get someone to look at their code and ensure that these silly little things won't happen anymore.

It's ridiculous, especially since this business is owned by cPanel!
 
WHMCS needs to have their code externally audited. They need to pay Rack911 to get someone to look at their code and ensure that these silly little things won't happen anymore.

It's ridiculous, especially since this business is owned by cPanel!

cPanel being a share holder shouldn't have any bearing on the audit, the external audit should be done simply because it's a billing application where customers data is held and WHMCS have been caught out now a few times now. WHMCS really need to step up and get this done before they loose all credibility.
 
cPanel being a share holder shouldn't have any bearing on the audit, the external audit should be done simply because it's a billing application where customers data is held and WHMCS have been caught out now a few times now. WHMCS really need to step up and get this done before they loose all credibility.

Completely and utterly agree. Honestly, they should be held to the same standard that corporate businesses are... We all love using WHMCS over some of the other similar products that we've tried out over time, but they are making it extremely worrying to have to constantly have to patch it.

I understand though, that it's not necessarily their fault for having security issues... but they are doing what they can. Their software is just like every other piece of software.. there will always be bugs, and they will always have to patch them to fix it... Just ask every other major software provider about patching bugs... it's just part of the software maintenance part of making said software.
 
Back
Top