XML-RPC for PHP Vulnerability Attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



We have recntly suffered an attack under this exploit, and disabled the our phpBB (Buletin Board). Although I understand the attack came in through a XML-PHP exploit, I can't find anything that tells me exactly what needs to be updated.

This is a RHL 7.2 server.
reference this article:
http://isc.sans.org/diary.php?storyid=823

We had 12 perl scripts running under the apache username. They each were running a script located in the /tmp folder. And created a very healthy list of other php pages (mostly buletin boards and group forums). It total killed our trunk line, 110% saturation.

Anyone familiar with this attack?? It is a very cripling attack and I am surprised I did not find more information about it.

it was br0k3d whose name was on the script file. The system itself wasn't comprised because apache is very limited on which folders it can enter and permissions it has. Near as I can tell the exploit allowed a user to download a script file using http protocol and save it to the /tmp fold. Then the exploit told apache to run /usr/bin/perl /tmp/nameofscriptfile that is when the fun began.

Another good reason *not* to setup a webserver as root or even a super user.

--
robert

--
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux