How to stop CloudFlare / Incapsula bypass for vBulletin.
Hi,
There are a few methods to bypass CloudFlare and Incapsulas protection to get the originating server ip, the first being mail server headers (so what I do is use a third party server with modified mail headers that remove the sender IP which would be the server we are trying to protect) and the second is vBulletins image retrieval. At the moment vBulletin has the following ;
This is bad! Anyone could simply use an ip logger such as http://iplogger.org/ and then could insert the fake image into the URL field to download it would grab the source ip and bypassing CF/Incapsula. What originally I was doing was editing the template and removing option 1 (the ability to retrieve image url) but as it turns out this is no good, because you can just inject the original code using firebug or element inspector and pretend nothing was ever gone! I did this for months until it was brought to my attention two days ago! The work around. We need to disable the following in php.ini (really only the fopen but include stops offsite injections). Code:
allow_url_fopen = Off allow_url_include = Off Edit includes/class_upload.php find Code:
if (ini_get('allow_url_fopen') == 0 AND !function_exists('curl_init')) Code:
if (ini_get('allow_url_fopen') == 0) Download No files for download. |