[nycphp-talk] worm/virus's hammering feedback scripts?
Rolan Yang
rolan at omnistep.com
Mon Sep 12 11:16:18 EDT 2005
Hans Zaunere wrote:
>Another address I've seen is mhkoch321 at aol.com
>
>Rolan, and I think you're right about this problem not getting enough
>exposure. If you can write-up a couple of paragraphs about it, I'll post it
>on nyphp.org's frontpage.
>
Ok, here's the bulletin. If anyone would like to polish it up, feel free
to do so. I'm not good at writing this stuff.
Problem:
Bot-net scanning underway to detect and log php scripts which are
vulnerable to a email header injection exploit.
What is vulnerable:
PHP scripts which send email based on cgi input data should be inspected
for the vulnerability.
Discussion:
A large scale distributed network of machines are currently being
employed to scan php based websites in search of scripts which are
vulnerable to a injection-style security exploit. The exploit permits an
attacker to send emails to arbitrary destinations. A common target is
the web based feedback form which submits an email to a designated
address, but could be any form which results in an email being sent.
The method used to exploit the vulnerability is by injection of email
headers into cgi form fields which are passed to the mail server. The
mail server then parses the headers and sends the email to the
address(es) designated in the maliciously injected headers.
Exploit:
The bot-net script currently probes vulnerable scripts by injecting
malicious headers into cgi form fields. The headers forward an email
response to one of several target email address to which the hacker has
access. We assume the attacker is collecting a list of vulnerable sites
which may be used later as an open relay for spam or large scale
deployment of viruses/worms.
For more information about the attack, please refer to:
http://securephp.damonkohler.com/index.php/Email_Injection (thank's to
Billy Reisinger for the link)
A google search for the target emails reveals that scans have been
taking place since at least July 8, 2005
Detection and Solution:
The current bot-net probe is known to send its reply to one of several
known email addresses on the following list.
Grep through your mail server logs for the list of emails. If any are
found, cross reference the time of the mailing to times in your web
server logs to help determine the exploitable script.
grep -f exploitemails.txt /var/log/maillog (or wherever your mail log is
located)
Vulnerable scripts should be modified to properly filter input fields.
Ken Robinson has posted a
php example at:
http://lists.nyphp.org/pipermail/talk/2005-September/016124.html
To follow the mailing list thread on this topic, please visit:
http://lists.nyphp.org/pipermail/talk/2005-September/thread.html#16123
(we should build a list of these emails and publish them along with this
notification)
Current list:
jrubin3546 at aol.com
mkoch321 at aol.com
wnacyiplay at aol.com
kshmng at aol.com
Homeiragtime at aol.com
bergkoch8 at aol.com
~Rolan Yang
More information about the talk
mailing list