Re: mystery process "unit"

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Tuesday 12 August 2008 10:16, Rainer Duffner wrote:
> Anything in /tmp ?
>
> Disable register_globals and allow_url_fopen.
> Set open_basedir for any virtual hosts to the absolute minimum.

allow_url_fopen was enabled on one of many sites. A developer put in an unsafe 
php include(). This allowed the w0rm to run a remote PHP script which used 
exec() to fetch and spawn the shellbot. Pretty standard. But it also did a 
decent job of removing itself from the filesystem. Lucky I noticed the weird 
process this morning, no harm done it seems.

I have mod_security installed now, but I tested a similar attack, and sadly, 
it still succeeds as long as allow_url_fopen is on. But this is not CentOS 
related.

cheers
Sam
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux