On Sat, Sep 27, 2014 at 11:02 AM, Keith Keller < kkel...@wombat.san-francisco.ca.us> wrote:
> On 2014-09-26, Valeri Galtsev <galt...@kicp.uchicago.edu> wrote: > > On Fri, September 26, 2014 5:13 pm, John R Pierce wrote: > >> > >> linux apache web servers with the bash exploit are getting owned en > >> masse today. my (patched) internet web server has logged 100s and > >> 100s of attempts like... > >> > >> 66.186.2.172 - - [26/Sep/2014:00:49:29 -0700] "GET /cgi-bin/test.sh > > > > I feel really stupid, but I have to ask. If your server wasn't patched, > it > > only would have owned by the above if that file exists, is executable by > > apache and it indeed invokes bash (say, has #!/bin/bash or whatever bash > > location is as first line), right? ;-) > > At first glance I would agree with you, but then I would wonder, if that > request wouldn't work almost anywhere, why are the skr1pt k1dd13s doing > it? > Old source versions of Apache used to come with a test.sh file in the default cgi-bin directory, but those days are long gone, I suspect. Cheers, Cliff _______________________________________________ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos