Note example.com in this entry is a different site
It looks like it could be something to do with certain versions of Chrome
not2easy
4:30 pm on Dec 21, 2016 (gmt 0)
The IP was Brazil, that's why it was mentioned. This 176.140. IP is from France, but it also is a "POST" request.
IanTurner
4:35 pm on Dec 21, 2016 (gmt 0)
Yes the consistency seems to be the POST request and it being Chrome. The pages that are having these request all have non-submitable forms - with no action and no submit button/submit function
lucy24
7:29 pm on Dec 21, 2016 (gmt 0)
Are all those + signs present in your raw logs? Or are they an artifact of whatever analytics program you're using? There are times when analytics or processed logs are a valid alternative--in rare situations they may even give better information--but in general there is no substitute for studying the actual, raw, unprocessed logs.
In any case you may choose to block POST requests for pages that don't involve forms; that way you don't have to keep playing whack-a-mole with IP ranges, and your server doesn't have to go to the effort of looking for the file each time.
keyplyr
7:33 pm on Dec 21, 2016 (gmt 0)
Are all those + signs present in your raw logs? Or are they an artifact of whatever analytics program you're using?
Likey in whatever scripting is being used for the vulnerability attempt.
IanTurner
7:38 pm on Dec 21, 2016 (gmt 0)
The plus signs are in the raw logs, I have shortened the meta description to anonymise - in the log they are requesting the full meta description. I'd guess it is to replace the spaces that are in the meta description.
IanTurner
7:40 pm on Dec 21, 2016 (gmt 0)
I might track back requests from those IPs to see if there is some kind of pattern - and to see if they are requesting the page from which the meta description is taken from first - but that won't be for a day or so.
keyplyr
12:00 am on Dec 22, 2016 (gmt 0)
The script is just using your meta description as part of the injection attempt at port 80 (the most widely used for hosting) on the server. Attempting to POST whatever content they have in their script, usually some type of spam, but it could also be a virus.
From the log snippet you posted, it shows your server returned a 404 (not found) response, However you should also look for other requests made by this IP address. If they were able to get any of the 2** response codes, then the injection may have been successful.
mack
4:19 am on Dec 22, 2016 (gmt 0)
It could be a bot that has previously crawled your site, now it has come back and is sending the wrong requests, perhaps a sloppy coder has specifies an incorrect database table or something and instead of a domain.bla/URL it's requesting domain.bla/description