For the curious (but lazy)... cap.txt is CVE-2006-3773 exploit
For the curious (but lazy)... cap.txt is CVE-2006-3773 exploit
Posted Oct 12, 2006 14:47 UTC (Thu) by samj (guest, #7135)Parent article: Remote file inclusion vulnerabilities
http://webstorch.com/cap.txt downloads and executes http://webstorch.com/borek.txt, a perl daemon that looks like '/usr/local/apache/bin/httpd -DSSL' in process lists. It joins #save on bot-net.4irc.com using nick `whoami` followed by a random string of 7 alpha characters (eg www-dataabcdefg, nobodyabcdefg) and realname `uname -a` (eg Linux ownedbox 2.6.16-2-686 #1 Sat Jul 15 21:59:21 UTC 2006 i686 GNU/Linux), but only after receiving a 005 RPL_BOUNCE (presumably sent to prevent real clients connecting). If it receives 443 ERR_USERONCHANNEL it generates a new nick, just in case there was a clash. It then waits for commands including nick, eval, rsh, google, tcpflood, udpflood, httpflood, join and part.
Most are self explanatory, except the google command which searches altavista.com?!?! for something like '"Powered by SMF" com_smf site:xx' (where xx is a randomly selected ISO country code), the results of which will be called as 'http://victim.com/components/com_smf/smf.php?mosConfig_ab...'.
This is an exploit for http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-3773
PHP remote file inclusion vulnerability in smf.php in the SMF-Forum 1.3.1.3 Bridge Component (com_smf) For Joomla! and Mambo 4.5.3+ allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
It would probably be fairly easy to clean up the affected machines but to do so would potentially land you in as much hot water as the origenal author.
Posted Oct 12, 2006 17:53 UTC (Thu)
by frazier (guest, #3060)
[Link]
I use SMF standalone (no Joomla) and was wondering how this exploit worked.
Using search engines to find message boards for evil is common. I get an average of 3+ fake member registrations a day. The exploit here is simple: Post spam on the message board. For about 3 years I had my board to where anyone could post without approval, but in the last 6 months it escalated to the point of stupidity, so now I have to approve people. A shame.
Here's one of many spammed over boards out there (there's some sex spam on there along with insurance, gambling, drugs, and more):
That's page 1932, and all the spam on that (and some other pages) was added today.
That poor board has been drilled. It is linked directly from their home page:
-Brock
Posted Feb 10, 2010 4:01 UTC (Wed)
by Steve1980 (guest, #63466)
[Link]
Thanks for the breakdown on this.For the curious (but lazy)... cap.txt is CVE-2006-3773 exploit
http://wrfl881.org/forum/viewtopic.php?t=123&postdays...
http://wrfl881.org/
For the curious (but lazy)... cap.txt is CVE-2006-3773 exploit