Critical phpwiki c99shell exploit Apr 12 2007 01:14PM
rurban x-ray at (2 replies)
Re: Critical phpwiki c99shell exploit Apr 12 2007 04:59PM
Jamie Riden (jamie riden gmail com)
Re: Critical phpwiki c99shell exploit Apr 12 2007 04:50PM
Gadi Evron (ge linuxbox org) (2 replies)
On 12 Apr 2007 rurban (at) x-ray (dot) at [email concealed] wrote:
> Via the Phpwiki 1.3.x UpLoad feature some hackers from russia uploaded a php3 or php4 file,
> install a backdoor at port 8081 and have access to your whole disc and overtake the server.
>
> A url in the file is http://ccteam.ru/releases/c99shell
>
> The uploaded file has a php, php3 or php4 extension and looks like a gif to the mime magic.
> So apache usually accepts it.
>
> To fix this phpwiki issue at first move the lib/plugin/UpLoad.php file out of this directory.
>
> You can fix it by adding those two lines to your list of disallowed extensions:
> php3
> php4
> Currently only "php" is disallowed.
>

This is a good best practice, but it doesn't hold water long
range. Further, where do you disallow these extensions? In the
application?

Mostly what the bad guys would do is upload, say.. .jpg, and then rename
it.

Gadi.

[ reply ]
Re: Critical phpwiki c99shell exploit Apr 16 2007 10:29AM
Taneli Leppä (taneli crasman fi)
RE: Critical phpwiki c99shell exploit Apr 12 2007 07:50PM
Ryan Neufeld (it magpowersystems com)


 

Privacy Statement
Copyright 2010, SecurityFocus