[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Handling abuse - like to get your help please
On Fri, Jun 17, 2016, at 09:30 PM, Michael Armbruster wrote:
> Hi Paul,
>
> assuming the default HTTP port, it was an attack to the port 80.
> Furthermore, the cryptic looking signs (%XX, whereas X is 0-9 or A-F),
> are url escaped characters. Unescaping them leads to something like this:
>
> > /cgi-bin/php-cgi?-d+allow_url_include=on+-d+safe_mode=off+-
> > d+suhosin.simulation=on+-d+disable_functions=""+-d+open_basedir=none+-
> > d+auto_prepend_file=php://input+-d+cgi.force_redirect=0+-
> > d+cgi.redirect_status_env=0+-n
>
...
> Putting all those bits together, we can conclude that an attacker tried
> to access the PHP executable on the CGI path on a webserver and
> disabling various security features. The malicious code or data he tried
> to send to the server was sent via POST data. Though we cannot see the
> post data, so we can only speculate what the attacker tried to do. A
> good bet would be to upload a shell to the webserver to gain further
> access on the server, but that's only speculation.
>
Specifically, this looks like
https://www.exploit-db.com/exploits/29290/
- server operators take note.
GD
--
http://www.fastmail.com - Accessible with your email software
or over the web
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays