DragonByte Tech | vBulletin Mods & Addons - Powered by vBulletin





User Tag List

Thanks Thanks:  0
Likes Likes:  0
Dislikes Dislikes:  0
Results 1 to 2 of 2

Thread: vBSecurity 1.1.1 flood of config.php variable tampering


Forum: DragonByte Security Lite Support

Questions & Answers for DragonByte Security.
Click here to buy!

  1. #1
    Member
    Level 41 (21,151 Loyalty Points)

    User InfoThanks / Tagging InfoGifts / Achievements / AwardsActivity Stats
    Join Date
    Feb 2013
    Posts
    45
    Rep Power
    0

    Question vBSecurity 1.1.1 flood of config.php variable tampering

    I am receiving many emails almost on the minute-

    Greetings,

    vBSecurity has detected a security alert regarding config.php Variable Tampering:
    $vbulletin->config['Misc']['admincpdir'] changed from 'admincp' to 'http://www.site.com/forum/admincp'
    $vbulletin->config['Misc']['modcpdir'] changed from 'modcp' to 'http://www.site.com/forum/modcp'
    $vbulletin->config['Misc']['admincpdir'] changed from 'admincp' to 'http://www.site.com/forum/admincp'
    $vbulletin->config['Misc']['modcpdir'] changed from 'modcp' to 'http://www.site.com/forum/modcp'
    $vbulletin->config['Datastore']['prefix'] is new: NULL

    The actions you have configured in the Security Center have been taken.

    Please log in to your AdminCP and the Security Center: http://www.site.com/forum/http://www...gory%3Dgeneral for guidelines on how to correct the issue.


    vBSecurity - vBulletin Security
    I am using a mod ,

    Template Modification System 1.2.0 Beta 4 Patch Level 1 This Modification allows automatic managament of Template-Modifications

    Maybe it is conflicting? Maybe it's dbSEO?, which I have just purchased the Pro version.

    I am receiving these emails when no live human should be accessing the admincp. Lately it has been just me and when I'm offline I am getting these alerts.

    Also, because the links are being rewritten I cannot easily read them, but could go to the admincp.
    0 0 0
     
    vBSecurity 1.1.1 flood of config.php variable tampering Send PM  

  2. #2
    Founder
    Level 0 (0 Loyalty Points)
    Belazor's Avatar
    User InfoThanks / Tagging InfoGifts / Achievements / AwardsActivity Stats
    Join Date
    Dec 2009
    Location
    Glasgow, United Kingdom
    Age
    30
    Posts
    27,743
    Blog Entries
    13
    Rep Power
    10

    Default

    You appear to be using a mod that converts the config.php variables to absolute URLs rather than relative folders.

    I recommend trying to disable your mods one-by-one until the flood stops, to figure out which one it is. Many areas of vB rely on the admincpdir and modcpdir variables remaining as folder names.
    Fillip Hannisdal
    Founder & Programming Director
    DragonByte Technologies http://www.DragonByte-Tech.com


    Please do not Private Message me with support requests or product questions. PMs are only for exchanging sensitive information (like FTP / AdminCP logins).
    Please do not Private Message me with business related queries (refunds, complaints, feedback, etc). Decado is the person to PM for those issues.
    Please do not Private Message Decado with support requests or forum errors.

    When I say "Hotfix Released" it means you should re-download the product and re-upload the files.
    Like our products? Want to be notified on social media networks when we release updates or new products? Click the buttons below to Like us on Facebook, Follow us on Twitter and Follow us on Google+!
    0 0 0
     
    vBSecurity 1.1.1 flood of config.php variable tampering Send PM  

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. [vB 4.2.x] Ungent Help Config.php Variable Tampering
    By lovelykiss in forum DragonByte Security Lite Support
    Replies: 3
    Last Post: 14th February 2013, 17:44
  2. [vB 4.2.x] vBSecurity and config.php
    By AAMT in forum DragonByte Security Lite Support
    Replies: 6
    Last Post: 19th January 2013, 19:48

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
This website uses cookies
We use cookies to store session information to facilitate remembering your login information, to allow you to save website preferences, to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.