Jump to content

**11/16/2019 Attention GolfWRX community. If you had to rest your forum password, please see info**


Recommended Posts

*** 11/16/2019 Attention GolfWRX community. If you had to reset your forum password, please see info below. ***

 

GolfWRX was informed of a potential issue and in an effort to be proactive, Passwords were reset to users potentially effected. If you were among these users please use the forget password recovery link:

https://forums.golfwrx.com/entry/passwordrequest

 

Please email [email protected] if further help is required. We're sorry for any inconvenience.

Before sending me a message for help, please look at the website support section:
Have a Ad/BST question, first look and post here:
BST AD Help
If you have a general help question, post here:
GolfWRX Website Help Desk

Link to comment
Share on other sites

Quick action and thanks for letting us know. No problem, ended up with a stronger password.

GHIN Index 12.9
LH Epic Flash Driver-LH, 10.5*, Project X EvenFlow Riptide 50 (Light)
LH Callaway Rogue 5-wood (18*), 7-wood (20*); Aldila Synergy 60-Reg
LH Callaway Rogue ST Pro 4-AW, Recoil Dart 75 F3
LH Cleveland RTX 50*, 54*, 58*
LH Odyssey Double Wide Stroke Lab Putter

Link to comment
Share on other sites

> @edjhahn said:

> Thanks

>

> My profile has totally changed. Is this being addressed as well?

 

 

This has no relation to profile issues and please provide info on missing posts in another thread.

 

Before sending me a message for help, please look at the website support section:
Have a Ad/BST question, first look and post here:
BST AD Help
If you have a general help question, post here:
GolfWRX Website Help Desk

Link to comment
Share on other sites

From Vanilla,

 

Here is the report.

https://status.vanillaforums.com/incidents/2zdqxf3bt7mj

 

Essentially, on Monday, November 11th, we released our 2019.016 patch. This patch included a vulnerability in our Quotes feature.

 

When users were quoted, their user data was output to the browser. This was not visible to the eye but , it could be accessed by:

Inspecting the network requests while quoting some user content.

Calling the /api/v2/media/scrape endpoint directly (with permission to view the scraped discussion or comment).

Inspecting the HTML of rich comment or discussion quotes.

 

 

Our users are asking if their passwords were compromised?

 

All users were at risk of being compromised, but only password hashes could have been leaked, as Vanilla does not store clear text passwords. We store salted and hashed passwords using BCRYPT with a cost of 10. The practical result of this is that any possibly leaked password hashes are not immediately usable for an attacker - they do not have your password, but rather a hash derived from your password. However, over time due to techniques such as Rainbow Tables (generating a list of hashes to compare with our hashes, a brute force approach) there is a risk of some passwords being recoverable, and hence the password reset. Doing a password reset is best industry practise even when possibly leaked credentials are hashed using a secure function such as BCRYPT.

 

So, for example, let's say I inspected the page, and looked at a Quote, I could look through the code and find a full user record - email, username, hashed password and more. This full record is generally not visible to the public and is guarded by various permission checks through Vanilla's controllers and API endpoints. We immediately patched a bug in our sanitization logic. Once the patch was in place, we forced all users to log out and forced a reset of all passwords as a preventative measure.

 

Was the entire community passwords reset?

 

Yes, all accounts were forced to reset their passwords; however, users who only login with Facebook or Twitter may not have had to reset their passwords, as those passwords are not stored in Vanilla.

 

Let me know if you have any further questions.

  • Like 3

Before sending me a message for help, please look at the website support section:
Have a Ad/BST question, first look and post here:
BST AD Help
If you have a general help question, post here:
GolfWRX Website Help Desk

Link to comment
Share on other sites

> @Gxgolfer said:

> From Vanilla,

>

> Here is the report.

> https://status.vanillaforums.com/incidents/2zdqxf3bt7mj

>

> Essentially, on Monday, November 11th, we released our 2019.016 patch. This patch included a vulnerability in our Quotes feature.

>

> When users were quoted, their user data was output to the browser. This was not visible to the eye but , it could be accessed by:

> Inspecting the network requests while quoting some user content.

> Calling the /api/v2/media/scrape endpoint directly (with permission to view the scraped discussion or comment).

> Inspecting the HTML of rich comment or discussion quotes.

>

>

> Our users are asking if their passwords were compromised?

>

> All users were at risk of being compromised, but only password hashes could have been leaked, as Vanilla does not store clear text passwords. We store salted and hashed passwords using BCRYPT with a cost of 10. The practical result of this is that any possibly leaked password hashes are not immediately usable for an attacker - they do not have your password, but rather a hash derived from your password. However, over time due to techniques such as Rainbow Tables (generating a list of hashes to compare with our hashes, a brute force approach) there is a risk of some passwords being recoverable, and hence the password reset. Doing a password reset is best industry practise even when possibly leaked credentials are hashed using a secure function such as BCRYPT.

>

> So, for example, let's say I inspected the page, and looked at a Quote, I could look through the code and find a full user record - email, username, hashed password and more. This full record is generally not visible to the public and is guarded by various permission checks through Vanilla's controllers and API endpoints. We immediately patched a bug in our sanitization logic. Once the patch was in place, we forced all users to log out and forced a reset of all passwords as a preventative measure.

>

> Was the entire community passwords reset?

>

> Yes, all accounts were forced to reset their passwords; however, users who only login with Facebook or Twitter may not have had to reset their passwords, as those passwords are not stored in Vanilla.

>

> Let me know if you have any further questions.

 

you should modify the logic for password reset to prevent people from providing the same password during the update.

  • Like 1
Link to comment
Share on other sites

So is GolfWRX also going to let the the users now know the original passwords have been compromised? ...and that they should reset all the accounts they used the same password for also? I see one guy here in this thread already point out his stupidity by boasting about how he actually changed the password to match his old password.. Seems like the point of changing the password was bit lost for him..

G430 Max 10K Hzrdus RDX Red 60 / Ping G430 Max 5fw KBS TD 70 / Titleist TSi2 4Hy  Tensei CK Pro Orange 80HY 

Ping iBlade 4-PW Modus3 120 / Cleveland RTX2.0 50° DG S200 / Ping Glide3.0 56° DG TI S400 / Ping Glide4.0 60° DG TI S400

Scotty Cameron Phantom 7.5 Stability Tour / Titleist ProV1x

Link to comment
Share on other sites

> @Hedgehog said:

> So is GolfWRX also going to let the the users now know the original passwords have been compromised? ...and that they should reset all the accounts they used the same password for also? I see one guy here in this thread already point out his stupidity by boasting about how he actually changed the password to match his old password.. Seems like the point of changing the password was bit lost for him..

 

this is so common i wouldn't call someone who did this stupid. many people use the exact same email + password combo for multiple accounts. they just don't realize how unwise of a practice that is. devs and product folks are in a good position to not only prevent people from using the same password but also making better security decisions. a little logic and some help text could go a long way toward this end. spreading the word about (e.g.) password managers would be even better.

Link to comment
Share on other sites

We had a briefing with Vanilla

 

GolfWRX was not one of the customers that was effected by the vulnerable code as we did not use the Rich editor at the time.

Logs were reviewed by Vanilla and they have confirmed no exposure.

 

Before sending me a message for help, please look at the website support section:
Have a Ad/BST question, first look and post here:
BST AD Help
If you have a general help question, post here:
GolfWRX Website Help Desk

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Our picks

    • 2024 Zurich Classic - Discussion and Links to Photos
      Please put any questions or comments here
       
       
       
       
      General Albums
       
      2024 Zurich Classic - Monday #1
      2024 Zurich Classic - Monday #2
       
       
       
      WITB Albums
       
      Alex Fitzpatrick - WITB - 2024 Zurich Classic
      Austin Cook - WITB - 2024 Zurich Classic
      Alejandro Tosti - WITB - 2024 Zurich Classic
      Davis Riley - WITB - 2024 Zurich Classic
      MJ Daffue - WITB - 2024 Zurich Classic
      Nate Lashley - WITB - 2024 Zurich Classic
       
       
       
       
       
      Pullout Albums
       
      MJ Daffue's custom Cameron putter - 2024 Zurich Classic
      Cameron putters - 2024 Zurich Classic
      Swag covers ( a few custom for Nick Hardy) - 2024 Zurich Classic
      Custom Bettinardi covers for Matt and Alex Fitzpatrick - 2024 Zurich Classic
       
       
       
      • 1 reply
    • 2024 RBC Heritage - Discussion and Links to Photos
      Please put any questions or comments here
       
       
       
       
       
      General Albums
       
      2024 RBC Heritage - Monday #1
      2024 RBC Heritage - Monday #2
       
       
       
       
      WITB Albums
       
      Justin Thomas - WITB - 2024 RBC Heritage
      Justin Rose - WITB - 2024 RBC Heritage
      Chandler Phillips - WITB - 2024 RBC Heritage
      Nick Dunlap - WITB - 2024 RBC Heritage
      Thomas Detry - WITB - 2024 RBC Heritage
      Austin Eckroat - WITB - 2024 RBC Heritage
       
       
       
       
       
      Pullout Albums
       
      Wyndham Clark's Odyssey putter - 2024 RBC Heritage
      JT's new Cameron putter - 2024 RBC Heritage
      Justin Thomas testing new Titleist 2 wood - 2024 RBC Heritage
      Cameron putters - 2024 RBC Heritage
      Odyssey putter with triple track alignment aid - 2024 RBC Heritage
      Scotty Cameron The Blk Box putting alignment aid/training aid - 2024 RBC Heritage
       
       
       
       
       
       
        • Like
      • 7 replies
    • 2024 Masters - Discussion and Links to Photos
      Huge shoutout to our member Stinger2irons for taking and posting photos from Augusta
       
       
      Tuesday
       
      The Masters 2024 – Pt. 1
      The Masters 2024 – Pt. 2
      The Masters 2024 – Pt. 3
      The Masters 2024 – Pt. 4
      The Masters 2024 – Pt. 5
      The Masters 2024 – Pt. 6
      The Masters 2024 – Pt. 7
      The Masters 2024 – Pt. 8
      The Masters 2024 – Pt. 9
      The Masters 2024 – Pt. 10
       
       
       
        • Thanks
        • Like
      • 14 replies
    • Rory McIlroy testing a new TaylorMade "PROTO" 4-iron – 2024 Valero Texas Open
      Rory McIlroy testing a new TaylorMade "PROTO" 4-iron – 2024 Valero Texas Open
        • Thanks
        • Like
      • 93 replies
    • 2024 Valero Texas Open - Discussion and Links to Photos
      Please put any questions or Comments here
       
       
       
      General Albums
       
      2024 Valero Texas Open - Monday #1
      2024 Valero Texas Open - Tuesday #1
       
       
       
       
       
      WITB Albums
       
      Ben Taylor - WITB - 2024 Valero Texas Open
      Paul Barjon - WITB - 2024 Valero Texas Open
      Joe Sullivan - WITB - 2024 Valero Texas Open
      Wilson Furr - WITB - 2024 Valero Texas Open
      Ben Willman - SoTex PGA Section Champ - WITB - 2024 Valero Texas Open
      Jimmy Stanger - WITB - 2024 Valero Texas Open
      Rickie Fowler - WITB - 2024 Valero Texas Open
      Harrison Endycott - WITB - 2024 Valero Texas Open
      Vince Whaley - WITB - 2024 Valero Texas Open
      Kevin Chappell - WITB - 2024 Valero Texas Open
      Christian Bezuidenhout - WITB (mini) - 2024 Valero Texas Open
      Scott Gutschewski - WITB - 2024 Valero Texas Open
      Michael S. Kim WITB – 2024 Valero Texas Open
       
       
       
      Pullout Albums
       
      Cameron putter - 2024 Valero Texas Open
      Ben Taylor with new Titleist TRS 2 wood - 2024 Valero Texas Open
      Swag cover - 2024 Valero Texas Open
      Greyson Sigg's custom Cameron putter - 2024 Valero Texas Open
      Davis Riley's custom Cameron putter - 2024 Valero Texas Open
      Josh Teater's custom Cameron putter - 2024 Valero Texas Open
      Hzrdus T1100 is back - - 2024 Valero Texas Open
      Mark Hubbard testing ported Titleist irons – 2024 Valero Texas Open
      Tyson Alexander testing new Titleist TRS 2 wood - 2024 Valero Texas Open
      Hideki Matsuyama's custom Cameron putter - 2024 Valero Texas Open
      Cobra putters - 2024 Valero Texas Open
      Joel Dahmen WITB – 2024 Valero Texas Open
      Axis 1 broomstick putter - 2024 Valero Texas Open
      Rory McIlroy testing a new TaylorMade "PROTO" 4-iron – 2024 Valero Texas Open
      Rory McIlroy's Trackman numbers w/ driver on the range – 2024 Valero Texas Open
       
       
       
        • Like
      • 4 replies

×
×
  • Create New...