[nycphp-talk] [OT] XSS, Joomla & Remote Shells
Ben Sgro (ProjectSkyline)
ben at projectskyline.com
Fri Jun 29 10:21:19 EDT 2007
Hello,
Its funny you mentioned this because I kinda assumed it might behave that
way.
I've seen shellcode in the past that did things you didn't know about...
Great link, thanks!
I decided to see what was encoded in the $c1, $c2 variables,
which were base64 encoded strings. This is what they held:
<script
language="javascript">hotlog_js="1.0";hotlog_r=""+Math.random()+"&s=81606&im=1&r="+escape(document.referrer)+"&pg="+escape(window.location.href);document.cookie="hotlog=1;
path=/"; hotlog_r+="&c="+(document.cookie?"Y":"N");</script><script
language="javascript1.1">hotlog_js="1.1";hotlog_r+="&j="+(navigator.javaEnabled()?"Y":"N")</script><script
language="javascript1.2">hotlog_js="1.2";hotlog_r+="&wh="+screen.width+'x'+screen.height+"&px="+(((navigator.appName.substring(0,3)=="Mic"))?screen.colorDepth:screen.pixelDepth)</script><script
language="javascript1.3">hotlog_js="1.3"</script><script
language="javascript">hotlog_r+="&js="+hotlog_js;document.write("<a
href='http://click.hotlog.ru/?81606' target='_top'><img "+"
src='http://hit4.hotlog.ru/cgi-bin/hotlog/count?"+hotlog_r+"&' border=0
width=1 height=1 alt=1></a>")</script><noscript><a
href=http://click.hotlog.ru/?81606
target=_top><imgsrc="http://hit4.hotlog.ru/cgi-bin/hotlog/count?s=81606&im=1"
border=0width="1" height="1"
alt="HotLog"></a></noscript><Br><br><!--LiveInternet counter--><script
language="JavaScript"><!--
document.write('<a href="http://www.liveinternet.ru/click" '+
'target=_blank><img src="http://counter.yadro.ru/hit?t52.6;r'+
escape(document.referrer)+((typeof(screen)=='undefined')?'':
';s'+screen.width+'*'+screen.height+'*'+(screen.colorDepth?
screen.colorDepth:screen.pixelDepth))+';'+Math.random()+
'" alt="liveinternet.ru: ïîêàçàíî ÷èñëî ïðîñìîòðîâ è ïîñåòèòåëåé çà 24 ÷àñà"
'+
'border=0 width=0 height=0></a>')//--></script><!--/LiveInternet-->
- Ben
Ben Sgro, Chief Engineer
ProjectSkyLine - Defining New Horizons
Our company: www.projectskyline.com
Our products: www.project-contact.com
This e-mail is confidential information intended only for the use of the
individual to whom it is addressed.
----- Original Message -----
From: "inforequest" <1j0lkq002 at sneakemail.com>
To: <talk at lists.nyphp.org>
Sent: Friday, June 29, 2007 3:18 AM
Subject: Re: [nycphp-talk] [OT] XSS, Joomla & Remote Shells
> Ben Sgro (ProjectSkyline) ben-at-projectskyline.com |nyphp dev/internal
> group use| wrote:
>
>> Hello again,
>> I've always had an interest in security. Not too long ago a friend was
>> looking
>> into deploying joomla for a client. He's a pentester/researcher for a
>> very well
>> educated and influential firm = ] , so he had to make sure it was going
>> to be secure.
>> He started researching and found that many joomla installs had/have been
>> comprimised
>> via XSS attacks.
>> Today, he posted the link of a site that had been owned by XSS and the
>> crackers installed this
>> web based backdoor script.
>> I grabbed the script and included it here
>> http://www.projectskyline.com/phplist/r57shell.txt to show PHP developers
>> AGAIN how important security is and give us an inside look at
>> some of the tools our enemies are armed with.
>> For those that deploy joomla, this is especially something to watch for.
>> For everyone else, just something to checkout.
>> You'll notice this script enables:
>> - Mail to be sent out (w/or w/out files attached)
>> - Commands to be run.
>> - Search for SUID, writable directories, files, tmp files., .(files) ...
>> - Outgoing connections to be established
>> - Some kind of IRC implementation
>> - SQL to be run
>> - Files can be downloaded and uploaded
>> - and much, much more.
>> - Ben
>>
>
> Perhaps most interesting about that r57shell is that it quietly remotely
> logs its own use. So in addition to the use as a backdoor shell script, it
> becomes a beacon for compromised systems - the tool maker gets a notice of
> every IP compromised by the tool when used by others.
>
> To quote full disclosure, "they [the script authors] can 0wn everything
> you 0wned...Trust no one... write your own tools."
>
> http://seclists.org/fulldisclosure/2006/Sep/0083.html
>
>
>
>
>
>
> --
> -------------------------------------------------------------
> Your web server traffic log file is the most important source of web
> business information available. Do you know where your logs are right now?
> Do you know who else has access to your log files? When they were last
> archived? Where those archives are? --John Andrews Competitive Webmaster
> and SEO Blogging at http://www.johnon.com
>
> _______________________________________________
> New York PHP Community Talk Mailing List
> http://lists.nyphp.org/mailman/listinfo/talk
>
> NYPHPCon 2006 Presentations Online
> http://www.nyphpcon.com
>
> Show Your Participation in New York PHP
> http://www.nyphp.org/show_participation.php
More information about the talk
mailing list