Snitz Forums 2000
Snitz Forums 2000
Home | Profile | Register | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 Help Groups for Snitz Forums 2000 Users
 Help: MOD Implementation
 leak in pm_members.asp! (succefull hack)
 New Topic  Topic Locked
 Printer Friendly
Next Page
Author Previous Topic Topic Next Topic
Page: of 3

MarcelG
Retired Support Moderator

Netherlands
2625 Posts

Posted - 02 January 2006 :  04:29:03  Show Profile  Visit MarcelG's Homepage
I just received a message from my board that forgot my password....the normal password.asp e-mail.
However, the strange thing is that I indeed can no longer log in anymore using my own password.
The password of my own account HAS been changed.
I just logged in using my other account, and that one wasn't changed.
With that account I locked my own account MarcelG, so that it can no longer be abused.

I'm diving into the logfiles now, to see what he/she has done exactly, and I see some referalls to pop_upload.asp:
quote:
2006-01-02 07:37:53 W3SVC1539007078 MULE 204.221.145.58 GET /images/icon_smile_emo.gif - 80 - 58.187.56.180 HTTP/1.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+.NET+CLR+1.1.4322) ASPSESSIONIDCSSTTQAT=IDCCFIKDBDAAKAMIBIJCHADC;+__utmc=182268921;+__utma=182268921.1919774026.1136186114.1136186114.1136186418.2;+__utmb=182268921;+__utmz=182268921.1136186114.1.1.utmccn=(organic)|utmcsr=google|utmctr=pop_upload.asp|utmcmd=organic;+Snitz00User=Pword=8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918&Name=MarcelG http://oxle.com/admin_smiles.asp oxle.com 200 0 0 1265 631 484

He's gotten into the admin_home.asp page, and cleared the searchlog, that's for sure.
AFter that he changed the upload settings, and added .asp to the allowed file types.
He then uploaded a file test.asp to the site.
This file (NTDaddy v1.9 by obzerve of fux0r inc.) was succefully uploaded....


So, I guess we've got a BIG leak here....

POP_UPLOAD.ASP is listed here :
http://www.dircity.com/newspub/html/1-2/342.html
http://www.xfocus.net/articles/200202/342.html
http://www.haiyang.net/safety/book/show.asp?id=217

My japanese/chinese isn't very good, so perhaps someone can translate this?

portfolio - linkshrinker - oxle - twitter

Edited by - MarcelG on 02 January 2006 12:58:59

HuwR
Forum Admin

United Kingdom
20595 Posts

Posted - 02 January 2006 :  04:56:26  Show Profile  Visit HuwR's Homepage
pop_upload.asp is NOT part of Snitz by the way, so your BIG leak is not in Snitz.

and yes, any asp file which allows you to upload files to your website is a potential security hazard.

it looks like they are doing it by spoofing the (Session(strCookieURL & "Approval") <> "15916941253" ) somehow, so probably your best bet is to change that to a more random number
Go to Top of Page

MarcelG
Retired Support Moderator

Netherlands
2625 Posts

Posted - 02 January 2006 :  05:03:04  Show Profile  Visit MarcelG's Homepage
HuwR, I know...
I also realise that I'm using a very old version of the upload mod....but - excuse my French - ****, this is a bad start of the year.

I see he/she has registered for a new user, with a non-existing e-mail address.
Then he/she has activated that user.

I just changed the Session(strCookieURL & "Approval") = "" in config.asp.
Is there another place where did should be changed?

portfolio - linkshrinker - oxle - twitter
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20595 Posts

Posted - 02 January 2006 :  05:11:44  Show Profile  Visit HuwR's Homepage
evryewhere it is used (all the admin pages).

quote:
He then uploaded a file test.asp to the site.
In all the upload mods I have seen file types are limited, it is, as you have found out, not a very good idea to allow people to upload asp files to your webspace

Go to Top of Page

MarcelG
Retired Support Moderator

Netherlands
2625 Posts

Posted - 02 January 2006 :  05:18:26  Show Profile  Visit MarcelG's Homepage
Huw, with all due respect ; the hacker changed this value as I described.
The 'funny' thing is that I'm using an old file uploading mod which was made by you...
'# File Attachment Mod by Huw Reddick


boolAllowedType = Instr(strAllowedExtensions, Right(faname,4)) > 0
		ImageFile = Instr(".jpg,.gif", Right(faname,4)) > 0
		WordDocument = Instr(".doc", Right(faname,4)) > 0
		NotePad = Instr(".txt", Right(faname,4)) > 0
		if referrer = "patch" then
			PatchFile = Instr(".zip", Right(faname,4)) > 0
		end if
		if referrer = "dbsfiles" then
			boolAllowedType = Instr(".asp", Right(faname,4)) > 0
		end if

To prevent this for future things, I guess we should prevent .asp (and .php, etc etc) even if it was defined as allowed.

portfolio - linkshrinker - oxle - twitter
Go to Top of Page

ruirib
Snitz Forums Admin

Portugal
26364 Posts

Posted - 02 January 2006 :  05:44:04  Show Profile  Send ruirib a Yahoo! Message
Marcel, did you find out how they first got into your system?


Snitz 3.4 Readme | Like the support? Support Snitz too
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20595 Posts

Posted - 02 January 2006 :  05:45:22  Show Profile  Visit HuwR's Homepage
Ok, that now explains what they are doing, since for referrer to be dbsfiles, they need to spoof your pop_upolad.asp form, so it looks like they are cross site scripting the pop_upload.asp form, so in the uploadengine.asp file you need to check that they have come from your pop_upload.asp
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20595 Posts

Posted - 02 January 2006 :  05:46:34  Show Profile  Visit HuwR's Homepage
quote:
Originally posted by ruirib

Marcel, did you find out how they first got into your system?


see my reply above, they are cross site scripting the pop_upload form
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20595 Posts

Posted - 02 January 2006 :  05:51:17  Show Profile  Visit HuwR's Homepage
someone should move this to the MOD forums since it is not related to the Snitz code.
Go to Top of Page

MarcelG
Retired Support Moderator

Netherlands
2625 Posts

Posted - 02 January 2006 :  05:51:20  Show Profile  Visit MarcelG's Homepage
quote:
Originally posted by HuwR

Ok, that now explains what they are doing, since for referrer to be dbsfiles, they need to spoof your pop_upolad.asp form, so it looks like they are cross site scripting the pop_upload.asp form, so in the uploadengine.asp file you need to check that they have come from your pop_upload.asp


Well, they're not that advanced.
They're not using the dbsfiles-referrer, as they actually need to change the upload settings to upload the asp file.
Shall I post my logfile, for further investigation ?

portfolio - linkshrinker - oxle - twitter
Go to Top of Page

MarcelG
Retired Support Moderator

Netherlands
2625 Posts

Posted - 02 January 2006 :  05:55:00  Show Profile  Visit MarcelG's Homepage
BTW ; these are the first two requests from that IP address:
quote:
2006-01-02 07:14:51 W3SVC1539007078 MULE 204.221.145.58 GET /topic.asp TOPIC_ID=1292 80 - 58.187.56.180 HTTP/1.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+.NET+CLR+1.1.4322) - http://www.google.com.vn/search?hl=vi&q=pop_upload.asp&meta= www.oxle.com 302 0 0 490 308 500
2006-01-02 07:14:53 W3SVC1539007078 MULE 204.221.145.58 GET /topic.asp TOPIC_ID=1292 80 - 58.187.56.180 HTTP/1.1 Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.2;+.NET+CLR+1.1.4322) - www.google.com.vn/search?hl=vi&q=pop_upload.asp" target="_blank">http://www.google.com.vn/search?hl=vi&q=pop_upload.asp&meta= oxle.com 302 0 0 488 304 390


portfolio - linkshrinker - oxle - twitter

Edited by - MarcelG on 02 January 2006 05:55:24
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20595 Posts

Posted - 02 January 2006 :  05:55:01  Show Profile  Visit HuwR's Homepage
post as much of your log as you can, since your problem looks more and more like a bug that was fixed over a year ago which allowed someone to change the admin password
Go to Top of Page

MarcelG
Retired Support Moderator

Netherlands
2625 Posts

Posted - 02 January 2006 :  05:57:07  Show Profile  Visit MarcelG's Homepage
BTW; I guess this is the hackbook he used:
translated version

quote:
regarding executive program and so on bbs/admin_upload.asp and bbs/admin_uploadengine.asp if does not need to cause
With may delete, if needs to be possible voluntarily to revise. Adds one line before the procedure:

" 15916941253 " best changes to other numerals, for example changes to:

And " 15916941253 " also changes to other executive programs in the same numeral. Attention: admin_login.asp
Center:

Also must change, otherwise is unable to use any executive program.


I downloaded the primitive edition
Snitz Forums 2000 Version 3.1 SR4 and Snitz Forums other editions, certainly has not actually discovered in existence
The surface institute said the security problem, Snitz the Forums own discussion forum (http://forum.snitz.com/forum/ also does not have
These questions. But I tested overseas very use Snitz Forums the discussion forum - include Italy, Germany and so on - actually am
Has these problems, obviously these procedures by no means sinicize the author add on.

portfolio - linkshrinker - oxle - twitter

Edited by - MarcelG on 02 January 2006 06:05:57
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20595 Posts

Posted - 02 January 2006 :  06:06:34  Show Profile  Visit HuwR's Homepage
well, that makes as much sense as the japanese version :)
Go to Top of Page

MarcelG
Retired Support Moderator

Netherlands
2625 Posts

Posted - 02 January 2006 :  06:15:59  Show Profile  Visit MarcelG's Homepage
Well, I just changed all instances of the "15916941253" thing, and removed all files that have that string in them from the source-viewer page (so that for future referal, the hacker cannot look it up.)

I haven't made any changes to pop_upload.asp and uploadengine.asp yet...

portfolio - linkshrinker - oxle - twitter
Go to Top of Page

HuwR
Forum Admin

United Kingdom
20595 Posts

Posted - 02 January 2006 :  06:23:55  Show Profile  Visit HuwR's Homepage
remove the part about dbsfiles, not sure why that was added to be honest, it is not in my original file. I would then add some extra checks in uploadengine.asp to make sure it is not being fired from a remote machine, you could also remove script permissions in IIS from any directories that can be uploaded to, that way even if they do upload a script they won't be able to execute it
Go to Top of Page
Page: of 3 Previous Topic Topic Next Topic  
Next Page
 New Topic  Topic Locked
 Printer Friendly
Jump To:
Snitz Forums 2000 © 2000-2021 Snitz™ Communications Go To Top Of Page
This page was generated in 0.41 seconds. Powered By: Snitz Forums 2000 Version 3.4.07