With
+23k members
+11k threads
+106k posts
we are the most popular IPTV community on the web.
IMPORTANT NOTE:
WE HAVE RECENTLY NOTICED THAT TOO MANY DOUBLE FAKE ACCOUNTS ARE CREATED IN THE PAST.
TO PREVENT THIS ISSUE THE DECISION WAS MADE THAT IN THE FUTURE A ANNUALLY FEE 20 EURO WILL BE RAISED FOR NEW MEMBERSHIPS.
Join now to the World of IPTV
How do you know it was injection and not just brute forced. Was the attack at your panel login or your SQL admin. Also what version number is the xtream UI your using.Last days some new methond attack happened, anyone have information for patch file allow input this sql injection
this new attack is more advance than thatHow do you know it was injection and not just brute forced. Was the attack at your panel login or your SQL admin. Also what version number is the xtream UI your using.
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
They would still need some way in to your server to attack it. Either by ssh access or as I mentioned above. You say they changing base files, which files have you noticed have been changed. Are the files they have changed allowing a backdoor for easy access. More info on your part would help to be able to find a solution.this new attack is more advance than that
is some exploit in base files
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
the attack is not sql injection, its known as a CLI injection, the method is very similar to a Snyk CLI Exploit released this last September.Please stop send me PM about this topic
At moment i dont have more information
And do you have a fix to stop this CLI injection?the attack is not sql injection, its known as a CLI injection, the method is very similar to a Snyk CLI Exploit released this last September.
nope, it's the reason why I don't use XUI or even XUI One. There is the saying, you pay for what you get for. It's the main reason why many are making their own xui API compatible panels with built-in better security. Once you see the source code, you can identify where and how to get into the panel by injecting in calls that do not have proper checks. Because it was poorly written, you get these results. A quick example of how to use request URI and be able to get "ALL" accounts inside the panel except admin.And do you have a fix to stop this CLI injection?
REQUEST_URI/live/zihin61/170322/38132.ts?token=SENdBBYMEwlAUlRZUl1QBQ8AAFZRDloOBFoGUQMHXg4HB1RSVlEJA1JAGhpHEURUWA9oCFEbWQsPCAMCTUFNRFYTagwBRgsRU1MHDABVFB0bFl4MUBtZCQEMBgFZVQ4BAE0XFQwAEwlAUQMBBlQUHRsHTxVQSw1ZW2ZUVRcKW1IRW1sQCQgdEQ0MaVxRCFdfXUANQwUbTxpeSkASW0FsQkEKFTEACFRYDQ9DVl0OV0JADVlBdFcMVl5UEGMIEVNSRwgXSUcGWEcQA0JdFl8UAwpSA0MZGwBXQldEQhhBAhVnMxdJRwFJRwcMRVFbCxQLGxZEQxkbCktoS1VDFRFdVl4ER0dfRgERTkBbWUw6VV5XDFICQVAMVkQbChJQQRQVXg5bDBELQ2wSC1IaDkcECQ1VDkNI
With the proper tools you can inject and get access to pretty much every user. Tools like these are offered by a close group sharing new backdoors and methods to get past the auth system.Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
A good proxy with geo block, Tor block, Mod Security , Fail2ban aso for mainnope, it's the reason why I don't use XUI or even XUI One. There is the saying, you pay for what you get for. It's the main reason why many are making their own xui API compatible panels with built-in better security. Once you see the source code, you can identify where and how to get into the panel by injecting in calls that do not have proper checks. Because it was poorly written, you get these results. A quick example of how to use request URI and be able to get "ALL" accounts inside the panel except admin.
REQUEST_URI/live/zihin61/170322/38132.ts?token=SENdBBYMEwlAUlRZUl1QBQ8AAFZRDloOBFoGUQMHXg4HB1RSVlEJA1JAGhpHEURUWA9oCFEbWQsPCAMCTUFNRFYTagwBRgsRU1MHDABVFB0bFl4MUBtZCQEMBgFZVQ4BAE0XFQwAEwlAUQMBBlQUHRsHTxVQSw1ZW2ZUVRcKW1IRW1sQCQgdEQ0MaVxRCFdfXUANQwUbTxpeSkASW0FsQkEKFTEACFRYDQ9DVl0OV0JADVlBdFcMVl5UEGMIEVNSRwgXSUcGWEcQA0JdFl8UAwpSA0MZGwBXQldEQhhBAhVnMxdJRwFJRwcMRVFbCxQLGxZEQxkbCktoS1VDFRFdVl4ER0dfRgERTkBbWUw6VV5XDFICQVAMVkQbChJQQRQVXg5bDBELQ2wSC1IaDkcECQ1VDkNI
With the proper tools you can inject and get access to pretty much every user. Tools like these are offered by a close group sharing new backdoors and methods to get past the auth system.
A good proxy with geo block, Tor block, Mod Security , Fail2ban aso for main
And for LB you can level up the Security with geo block or allow only and again tor block.
Then you will be reasonable safe i think.
Channels | MatchTime Unblock CDN | Offshore Server | Contact |
100 cnx / 90€ | 5Gbps / 180€ | 48CPU-256GRAM 10Gbps 569€ | Skype live:giefsl |
500 cnx / 350€ | 10Gbps / 350€ | 48CPU-128GRAM 5Gbps / 349€ | TG @changglobize |
1000 cnx / 500€ | 20Gbps / 700€ | 40CPU-128GRAM 20Gbps / €980 | http://coronaserver.com |
We know, ad-blocking software do a great job at blocking ads. But our site is sponsored by advertising.
For the best possible site experience please take a moment to disable your AdBlocker.
You can create a Account with us or if you already have account, you can prefer an Account Upgrade.