denny: (This way up)
[personal profile] denny
This is interesting - the initial entry point seems to be a poorly initialised variable in the gallery/geeklog libs or something, but from there on things get incredibly complex. The end result is the compromised machine (which was only running Apache) being used as a spam-sending box.

http://www.securityfocus.com/guest/24043

(no subject)

Date: 2003-12-10 06:39 am (UTC)
From: [identity profile] olithered.livejournal.com
Interesting reading!

(no subject)

Date: 2003-12-10 08:05 am (UTC)
From: [identity profile] deliberateblank.livejournal.com
Interesting to note that the sploit as actually used wouldn't have worked if they had i) register_globals off, ii) short_open_tag off (the script started "<?echo"), iii) safe_mode on, iv) allow_url_fopen off.

The first is generally good practice, and the default for newer PHP installs. The second is also good practice, but easy to account for - it's just that this particular sploit script didn't.

The third is possibly overkill and I have no idea whether the gallery and geeklog packages need some of the functions it disables. They probably shouldn't. But it would definitly have stopped the script running random system commands. Then again they could have implemented the whole daemon in PHP which ought to have worked (and I can think of ways to get round any script execution time limit they might have imposed.)

The fourth I think is a highly dangerous feature anyway. You at least ought to be able to set limits on what destinations are permitted, and what functions use the fopen wrappers.

May 2020

S M T W T F S
     12
3456789
10111213141516
17181920212223
2425262728 2930
31      

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags