No. We were in constant contact with various folks from core, foundation and clusteradmin. So, none of this nonsense please.Meanwhile where is Foundation ? Hey , did something happened ?
Not that I could find in our situation. I took apart their injected javascript. It didn't do much besides redirecting to a github repo that hosted the "defacement" page. That defacement page also contained some javascript, but that was nothing more than a basic http/tcp/udp connection flooder. Nothing fancy and most of it didn't even work properly.I wonder if the XSS hack was combined with other methods to do more damage.
There was a Foundation post on Facebook. Showing they knew nothing. Excuse me if I sometimes over-exagerate. I only tell my feelings. And really have no idea, the good/bad they do. So for me it is something "black".No. We were in constant contact with various folks from core, foundation and clusteradmin. So, none of this nonsense please.
They managed to center the div vertically. That's impressive enoughI took a screenshot with my cell phone.
View attachment 25824
These idiots don't even know what responsiveness is.
That was funny.They managed to center the div vertically.
i guess that my proxy blocked the bg image. i simply saw a black bg.I took a screenshot with my cell phone.
View attachment 25824
These idiots don't even know what responsiveness is.
@media (max-width: 300px) {
.haha { display: block; }
}
This is literally what happened.This is about the corresponding hack on linux.org from this thread.
"Edit2: more info: https://github.com/methosiea/xenforo-2-xss
So, the attack chain is basically:
I wonder if the XSS hack was combined with other methods to do more damage.
- Attacker registers an account
- New post w/ the xss payload - it goes to the queue
- An admin views it, it fires off the xss payload stealing his session
- Attacker creates the malicious widget"
I also wonder why someone would hack a public forum.
/grandpa