copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Security Bul...
»
By Operating...
»
UNIX (all)
»
HP Tru64 UNIX
» AL-2004.044 -- US-CERT TA04-356A -- New worm Santy.A...
AL-2004.044 -- US-CERT TA04-356A -- New worm Santy.A actively exploiting phpBB highlight parameter vulnerability
Date:
22 December 2004
References
:
AU-2005.0008
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== A U S C E R T A L E R T AL-2004.044 -- AUSCERT ALERT US-CERT TA04-356A New worm Santy.A actively exploiting phpBB highlight parameter vulnerability 22 December 2004 =========================================================================== AusCERT Alert Summary --------------------- Product: phpBB 2.0.10 and prior Publisher: US-CERT Operating System: UNIX variants Linux variants Windows Impact: Execute Arbitrary Code/Commands Access: Remote/Unauthenticated Original Bulletin: http://www.us-cert.gov/cas/techalerts/TA04-356A.html Comment: UNIX systems are actively being exploited by this worm. Windows systems without Perl installed will not be infected by this worm but are still vulnerable and may be affected by other exploit code. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Technical Cyber Security Alert TA04-356A Exploitation of phpBB highlight parameter vulnerability Original release date: December 21, 2004 Last revised: -- Source: US-CERT Systems Affected phpBB versions 2.0.10 and prior Overview The software phpBB contains an input validation problem in how it processes a parameter contained in URLs. An intruder can deface a phpBB website, execute arbitrary commands, or gain administrative privileges on a compromised bulletin board. I. Description phpBB is an open-source bulletin board application. It fails to properly perform an urldecode() on the "highlight" parameter supplied to viewtopic.php. This may allow a remote attacker to execute arbitrary commands on a vulnerable server. According to reports, this vulnerability is being actively exploited by the Santy.A worm. The worm appears to propogate by searching for the keyword "viewtopic.php" in order to find vulnerable sites. The worm writes itself to a file named "m1ho2of" on the compromised system. It then overwrites files ending with .htm, .php, .asp. shtm, .jsp, and .phtm replacing them with HTML content that defaces the web page. The worm then tries to use PERL to execute itself on the compromised system and propogate further. US-CERT is tracking this issue as: VU#497400 - phpBB viewtopic.php fails to properly sanitize input passed to the "highlight" parameter II. Impact A remote attacker may be able to deface a phpBB website and execute arbitrary commands on a compromised bulletin board. III. Solution Upgrade phpBB Upgrade to phpBB verison 2.0.11 to prevent exploitation. Appendix A. References * US-CERT Vulnerability Note VU#497400 -
* phpBB Downloads - < http://www.phpbb.com/downloads.php> * phpBB Announcement -
* Symantec Security Response - Perl.Santy -
* McAfee - Computer Virus Software and Internet Security -
_________________________________________________________________ This vulnerability was reported by the phpBB Development Team. _________________________________________________________________ Feedback can be directed to the authors: Jeffrey Gennari and Jason Rafail _________________________________________________________________ This document is available from:
_________________________________________________________________ Copyright 2004 Carnegie Mellon University. Terms of use:
_________________________________________________________________ Revision History Dec 21, 2004: Initial release Last updated December 21, 2004 - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBQci1ihhoSezw4YfQAQLarQf/cyzsvhFzCnqDyzRRqccGx8yG+AUMLQnG C+eZ3oyfEntqJkMh4ApNb1er8F+7BkHNnhzvPeifqDQPMGwpjLrBnyPr4vSneG3v JBregSqACGHzR7/TDeDJ94kiBFPty77AS5r6eqsLe0ueaL2kA149lEEcbGjPGd+q P0my0Jxkal0DPOwGuPyFIcjdGBAYHXqyCbI0hl6DqGGj/vSRkuhjt5EY0K7ShOdV JaSmRWgkbM0vXtKj+sWCSOLFoDschFzlW+Egke17xf3bIZUwvx5uNsw8AXZwCiaa CJNJcL+sI8JvXEQqC5xiAkYgUVDA+WzRGtKoVfkEJBpv8PS0MyhX+Q== =ZLLn - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQcjMHCh9+71yA2DNAQIJ7gQAkEYdzgRQOS7kDU0Udzq7I0mFThOFvfN9 hB5ffQ9U0mgIVP+xDEzp8qFvoMSx3KqTvVy5XSK6wxTzRXh9aJYCJS57+4ncpKMN s3VOt2TzONHYkWaWZTAI4+MrB1CH0bRFP59wOdqQnPzDH4GsNMMT2oudK3JOmG6E i4mdLO46y0g= =weQ2 -----END PGP SIGNATURE-----
Comments? Click here
http://www.auscert.org.au/render.html?cid=32&it=4653