Products

Solutions

Resources

Partners

Community

About

New Community Website

Ordinarily, you'd be at the right spot, but we've recently launched a brand new community website... For the community, by the community.

Yay... Take Me to the Community!

Welcome to the DNN Community Forums, your preferred source of online community support for all things related to DNN.
In order to participate you must be a registered DNNizen

HomeHomeDNN Open Source...DNN Open Source...Module ForumsModule ForumsStoreStoreRe:Javascript malware injection in Store Catalog ModuleRe:Javascript malware injection in Store Catalog Module
Previous
 
Next
New Post
10/2/2008 11:27 PM
 

Thanks for the query Brian. I ran it . It returned blank.The database is clean as a whistle. Can't figure out where the heck  it's coming from.

 
New Post
10/3/2008 10:54 AM
 

As soon as I thought about that again this morning, I realized I had missed something in that script.  It was only searching for columns whose exact content was c72649779390m4883dada531e6, rather than columns that contained c72649779390m4883dada531e6.  So, I revisted that for you, and did that refactoring I mentioned so that this should be a lot easier to read and you can run it from the DNN SQL page if that's easier for you.

CREATE TABLE #results ([table] varchar(255), [column] varchar(255))
 
DECLARE @T varchar(255), @C varchar(255);
DECLARE Table_Cursor CURSOR FOR
SELECT a.name, b.name
FROM sysobjects a, syscolumns b
WHERE a.id = b.id AND a.xtype = 'u' AND
(b.xtype = 99 OR
b.xtype = 35 OR
b.xtype = 231 OR
b.xtype = 167);
OPEN Table_Cursor;
FETCH NEXT FROM Table_Cursor INTO @T, @C;
WHILE (@@FETCH_STATUS = 0) BEGIN
DECLARE @query as nvarchar(4000)
SET @query = 'insert into #results ([column], [table]) SELECT ''' + @C + ''' as [column], ''' + @T + ''' as [table] where exists (select NULL FROM [' + @T + '] WHERE [' + @C + '] LIKE ''%c72649779390m4883dada531e6%'')'
PRINT @query
EXEC(@query);
FETCH NEXT FROM Table_Cursor INTO @T, @C;
END;
CLOSE Table_Cursor;
DEALLOCATE Table_Cursor;
SELECT * FROM #results
DROP TABLE #results

If it's still clean after running this, there's definitely something quite strange going on with your store module

Hope it helps!


Brian Dukes
Engage Software
St. Louis, MO
866-907-4002
DNN partner specializing in custom, enterprise DNN development.
 
Previous
 
Next
HomeHomeDNN Open Source...DNN Open Source...Module ForumsModule ForumsStoreStoreRe:Javascript malware injection in Store Catalog ModuleRe:Javascript malware injection in Store Catalog Module


These Forums are dedicated to discussion of DNN Platform and Evoq Solutions.

For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines:

  1. No Advertising. This includes promotion of commercial and non-commercial products or services which are not directly related to DNN.
  2. No vendor trolling / poaching. If someone posts about a vendor issue, allow the vendor or other customers to respond. Any post that looks like trolling / poaching will be removed.
  3. Discussion or promotion of DNN Platform product releases under a different brand name are strictly prohibited.
  4. No Flaming or Trolling.
  5. No Profanity, Racism, or Prejudice.
  6. Site Moderators have the final word on approving / removing a thread or post or comment.
  7. English language posting only, please.
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out
What is Liquid Content?
Find Out