Dear members,
On Juli 18th I was informed by member 0gTryptamine about a vulnerability on the forum.
Via the [Members] section it was possible to enter SQL-injection text. Simply stated SQL-injection can be used to enter a malicious query into the database that can alter or retrieve data.
WHAT PERSONAL DATA WAS AVAILABLE?
Personal data that could be retrieved is the following:
* Email-address
* Password
This data was stored in the database with the following methods:
* Email-address:
AES256 encryption where the encryption takes place outside the DMT-nexus, so no encryption key is stored in our database.
* Password:
Hashing through scrypt followed by AES256 encryption where the encryption takes place outside the DMT-nexus, so no encryption key is stored in our database.
RESOLVED
After being informed about this vulnerability, it was resolved on the same day.
WAS THIS VULNERABILITY ACTIVELY USED?
At this moment is is not clear if anyone actively used this vulnerability.
WHAT TO DO NOW?
For now it is best to change your password, please use a strong password that you do not use anywhere else.
MORE INFORMATION
If you need more information you can reach me via this topic, send me a PM on the forum or send an email to info@dmt-nexus.me
Kind regards,
The Traveler
On Juli 18th I was informed by member 0gTryptamine about a vulnerability on the forum.
Via the [Members] section it was possible to enter SQL-injection text. Simply stated SQL-injection can be used to enter a malicious query into the database that can alter or retrieve data.
WHAT PERSONAL DATA WAS AVAILABLE?
Personal data that could be retrieved is the following:
* Email-address
* Password
This data was stored in the database with the following methods:
* Email-address:
AES256 encryption where the encryption takes place outside the DMT-nexus, so no encryption key is stored in our database.
* Password:
Hashing through scrypt followed by AES256 encryption where the encryption takes place outside the DMT-nexus, so no encryption key is stored in our database.
RESOLVED
After being informed about this vulnerability, it was resolved on the same day.
WAS THIS VULNERABILITY ACTIVELY USED?
At this moment is is not clear if anyone actively used this vulnerability.
WHAT TO DO NOW?
For now it is best to change your password, please use a strong password that you do not use anywhere else.
MORE INFORMATION
If you need more information you can reach me via this topic, send me a PM on the forum or send an email to info@dmt-nexus.me
Kind regards,
The Traveler