<?xml version="1.0" encoding="utf-8" ?>
<?xml-stylesheet type="text/xsl" href="RSS_xslt_style.asp" version="1.0" ?>
<rss version="2.0" xmlns:WebWizForums="https://syndication.webwiz.net/rss_namespace/">
 <channel>
  <title>ProductCart Shopping Cart Software Forums : Database Breach</title>
  <link>https://forum.productcart.com/</link>
  <description><![CDATA[This is an XML content feed of; ProductCart Shopping Cart Software Forums : Using ProductCart : Database Breach]]></description>
  <copyright>Copyright (c) 2006-2013 Web Wiz Forums - All Rights Reserved.</copyright>
  <pubDate>Fri, 10 Apr 2026 22:46:16 +0000</pubDate>
  <lastBuildDate>Mon, 16 Jun 2008 06:24:25 +0000</lastBuildDate>
  <docs>http://blogs.law.harvard.edu/tech/rss</docs>
  <generator>Web Wiz Forums 12.04</generator>
  <ttl>360</ttl>
  <WebWizForums:feedURL>https://forum.productcart.com/RSS_post_feed.asp?TID=1547</WebWizForums:feedURL>
  <image>
   <title><![CDATA[ProductCart Shopping Cart Software Forums]]></title>
   <url>https://forum.productcart.com/forum_images/pc_logo_50.png</url>
   <link>https://forum.productcart.com/</link>
  </image>
  <item>
   <title><![CDATA[Database Breach : Hi allI have just been attacked...]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post5551.html#5551</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=171">MarkCoyle</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 16-June-2008 at 6:24am<br /><br />Hi all<br><br>I have just been attacked with a database SQL insert overnight.<br><br>This time it was:<br>&lt;scrrrript src=http://www.jumpbnr.com/b.js&gt;&lt;/scrrrrript&gt;<br><br>(misspelling of script is deliberate above to avoid any issues).<br><br>It's a very similar situation to everyone else with an issue though as you can see to a different site.<br><br>Early Impact have been helpful and I have been able to remove it using the SQL insert query they provide.&nbsp; However it also removed all flash media players from the site too so I'm going back to Friday's backup and having that restored.<br><br>As these types of hacks seem to be on the rise here were the symptoms I discovered when viewing the site this morning in case anyone else is hit:<br>1.&nbsp; No product cart images were showing up with just the URLs to the images showing.<br>2.&nbsp; When the site was loading if I looked at the status bar I could see mention of the jumpbnr.com site which of course shouldn't be there.<br><br>I then went to look via MySQL admin and found the string I mentioned with the script inserted into each field.<br><br>I thought I was patched already but have reapplied it via FTP just in case.<br><br>I will also be investigating HackerSafe as soon as things are back.<br><br>Any tips, experiences and thoughts welcome.&nbsp;&nbsp; As a user community we need to keep on top of this and track all the variants so that each of us is fully aware and can provide the latest advice.<br><br>Many kind thanks<br><br>cheers<br>Mark<br><br>]]>
   </description>
   <pubDate>Mon, 16 Jun 2008 06:24:25 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post5551.html#5551</guid>
  </item> 
  <item>
   <title><![CDATA[Database Breach : Ok - Thanks, that&amp;#039;s great...]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post5157.html#5157</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=303">Hamish</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 21-May-2008 at 3:05pm<br /><br />Ok - Thanks, that's great :-)&nbsp;]]>
   </description>
   <pubDate>Wed, 21 May 2008 15:05:11 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post5157.html#5157</guid>
  </item> 
  <item>
   <title><![CDATA[Database Breach : Yes, that is correct. validNum...]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post5156.html#5156</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=1">ProductCart</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 21-May-2008 at 1:45pm<br /><br />Yes, that is correct. validNum cannot be used on numbers that are not integers. Those numbers are NEVER used in a query as an ID (e.g. a product or category ID is always an integer).<br><br>We will send out a new update in the next couple of hours. We believe we have found and fixed the vulnerability. We are just doing some final testing.]]>
   </description>
   <pubDate>Wed, 21 May 2008 13:45:41 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post5156.html#5156</guid>
  </item> 
  <item>
   <title><![CDATA[Database Breach : Hi, I&amp;#039;ve seen the email referring...]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post5155.html#5155</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=303">Hamish</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 21-May-2008 at 1:19pm<br /><br />Hi,<br>&nbsp;&nbsp; I've seen the email referring to SQL injection attacks and that <i>isNumeric</i> should not be used in custom forms.<br>I did a quick scan of the souce code and see about 50 files&nbsp; in the pc directory that contain <i>isNumeric</i>.&nbsp;&nbsp; We are running V3.11 and the email says all versions after 2.7 should be OK.<br>Am I correct in presuming then, that the specific uses of <i>isNumeric</i> that remain are fine? <br><br><br>]]>
   </description>
   <pubDate>Wed, 21 May 2008 13:19:00 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post5155.html#5155</guid>
  </item> 
  <item>
   <title><![CDATA[Database Breach : I think another question to be...]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post5091.html#5091</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=290">Greg Dinger</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 18-May-2008 at 8:20pm<br /><br />I think another question to be asked is if there were any non-ProductCart scripts in use.&nbsp; The original poster of this thread got nailed through a vendor page,&nbsp;and not as a result of any ProductCart vulnerability.&nbsp; Might that be what happened here?<DIV>&nbsp;</DIV><DIV>And why only one day's backup?&nbsp; Does your host not provide a deeper backup than the most recent day?&nbsp; What database are you running?</DIV>]]>
   </description>
   <pubDate>Sun, 18 May 2008 20:20:05 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post5091.html#5091</guid>
  </item> 
  <item>
   <title><![CDATA[Database Breach : Hi Dan,Could you clarify which...]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post5090.html#5090</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=1">ProductCart</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 18-May-2008 at 7:35pm<br /><br />Hi Dan,<br><br>Could you clarify which version of ProductCart you were using at the time the SQL injection attack occurred, and whether any custom forms&nbsp; (or customized ProductCart pages) were used on the Web site?<br><br>Also, if you haven't already done so, certainly submit a support ticket.<br>]]>
   </description>
   <pubDate>Sun, 18 May 2008 19:35:19 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post5090.html#5090</guid>
  </item> 
  <item>
   <title><![CDATA[Database Breach : I, unfortunately, was recently...]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post5089.html#5089</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=938">retreat987</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 18-May-2008 at 6:24pm<br /><br />I, unfortunately, was recently hit by an SQL injection attack. It revealed several problems with our database backups; The attack overwrote a lot of fields throughout the database, and the backup saved those changes. The attack happened over a weekend, and by the time we noticed it Monday morning, the backup had taken effect, overwriting the last good backup we had.<br><br>I use ProductCart (with the latest version), and am not sure how the attacker was able to do their thing. The inserted this line into most every field in the database:<br><br>&lt;scrript src="http://winzipices.cn/4.js"&gt;&lt;/scrript&gt;<br><br>(Typos in "script" are intentional, just in case).<br><br>I'm not sure how best to keep them from doing it again. I've been reading everyone's posts, and will try one of the Hacker prevention tools listed, and hope that is enough. <br><br>My initial solution was to block all outside traffic to the site, while I tried to remove all instances of the script from the database. I'm still trying to re-create all the products, which is taking some time as they all have a lot of options and thus sub products.<br><br>Currently I've just changed the url for the product cart software (scart/pc, rather than cart/pc) and set up a simple landing page (www.DandDToys.com) for users (we have a brick and mortar store, and process all our orders through product cart, so I can't simply close the store).<br><br>Any additional tips would be appreciated.<br><br>Thanks,<br><br>Dan<br>]]>
   </description>
   <pubDate>Sun, 18 May 2008 18:24:01 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post5089.html#5089</guid>
  </item> 
  <item>
   <title><![CDATA[Database Breach : This was just forwarded to me....]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post4783.html#4783</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=290">Greg Dinger</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 23-April-2008 at 1:46pm<br /><br /><P>This was just forwarded to me.&nbsp; I see a familiar domain name (<FONT face=Arial color=#000080 size=2>nihaorr1</FONT>)&nbsp;listed in there:<BR><A href="http://securitylabs.websense.com/c&#111;ntent/Alerts/3070.aspx" target="_blank">http://securitylabs.websense.com/content/Alerts/3070.aspx</A></P>]]>
   </description>
   <pubDate>Wed, 23 Apr 2008 13:46:57 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post4783.html#4783</guid>
  </item> 
  <item>
   <title><![CDATA[Database Breach : Nicolai, I, and I&amp;#039;m sure...]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post4760.html#4760</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=303">Hamish</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 21-April-2008 at 11:09am<br /><br /><font face="Times New Roman" size="3">Nicolai,<br>&nbsp;&nbsp; I, and I'm sure many others, appreciate being well informed by people who properly understand these things.<br>So - Thanks &amp; kudos to you &amp; Greg for helping build awareness &amp; , of course, thanks to EA&nbsp; <img src="https://forum.productcart.com/smileys/smiley17.gif" border="0"> for building a great product that keeps up to date with security.<br><br>Situtions like this just remind us all how important keeping security up to date - part of which is keeping pretty close to current on software releases. <br><br></font>]]>
   </description>
   <pubDate>Mon, 21 Apr 2008 11:09:36 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post4760.html#4760</guid>
  </item> 
  <item>
   <title><![CDATA[Database Breach : Let mejust clarify that I was...]]></title>
   <link>https://forum.productcart.com/database-breach_topic1547_post4759.html#4759</link>
   <description>
    <![CDATA[<strong>Author:</strong> <a href="https://forum.productcart.com/member_profile.asp?PF=1149">nhertz</a><br /><strong>Subject:</strong> 1547<br /><strong>Posted:</strong> 21-April-2008 at 8:50am<br /><br /><P>Let me&nbsp;just clarify that I was not referring to Early Impact software in any of my posts. It was my bad for not being more specific! You are right that I am not familiar with the source code behind your software and therefore I cannot argue for or against it.<BR>I was referring to posts in forums around the web making reference to antivirus products from companies like Symantec, Bit defender, Sophos etc.. <BR>I don't want to criticise these products in any way, I'm just leaving clear that standard antivirus or firewall software is not going to help you on this one.<BR><BR>Regards,</P><P>Nicolai Hertz<BR>Software Programmer</P>]]>
   </description>
   <pubDate>Mon, 21 Apr 2008 08:50:55 +0000</pubDate>
   <guid isPermaLink="true">https://forum.productcart.com/database-breach_topic1547_post4759.html#4759</guid>
  </item> 
 </channel>
</rss>