Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-id: <9E9B4751-9353-4605-A4F2-4E261F7D5038@me.com>
Date: Sat, 24 Jan 2015 18:17:56 -0500
From: "Larry W. Cashdollar" <larry0@...com>
To: Open Source Security <oss-security@...ts.openwall.com>
Subject: Re: SEANux 1.0 remote back door

After discussing this with the SEA, we’ve determined this is a misconfiguration.  They are planning on fixing it in the next release.

The fix is simply modifying apache’s ports.conf to bind apache to localhost.

# cat ports.conf |grep -n 127
8:NameVirtualHost 127.0.0.1:80
9:Listen 127.0.0.1:80

Actually one of the fastest vendor responses I’ve ever seen. :-)


> On Jan 24, 2015, at 3:05 PM, Larry W. Cashdollar <larry0@...com> wrote:
> 
> Hello All,
> I thought you might be interested in this from by blog with screen shots http://www.vapid.dhs.org/blog/01-23-2015/ :
> 
> SEANux 1.0 backdoor
> 
> Larry W. Cashdollar
> 1/23/2015
> 
> 
> SEANux 1.0 is a linux distribution Available here developed by the Syrian Electronic Army. It has an apache webserver listening on 0.0.0.0:80
> root@...ry-VirtualBox:/etc/mysql# netstat -an
> Active Internet connections (servers and established)
> Proto Recv-Q Send-Q Local Address           Foreign Address         State      
> tcp        0      0 127.0.0.1:6010          0.0.0.0:*               LISTEN     
> tcp        0      0 127.0.0.1:3306          0.0.0.0:*               LISTEN     
> tcp        0      0 127.0.1.1:53            0.0.0.0:*               LISTEN     
> tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN     
> tcp        0      0 127.0.0.1:631           0.0.0.0:*               LISTEN     
> tcp        0      0 192.168.0.33:22         192.168.0.22:53474      ESTABLISHED
> tcp6       0      0 ::1:6010                :::*                    LISTEN     
> tcp6       0      0 :::80                   :::*                    LISTEN     
> tcp6       0      0 :::22                   :::*                    LISTEN     
> tcp6       0      0 ::1:631                 :::*                    LISTEN     
> tcp6       1      0 ::1:57375               ::1:631                 CLOSE_WAIT 
> udp        0      0 0.0.0.0:68              0.0.0.0:*                          
> udp        0      0 0.0.0.0:52375           0.0.0.0:*                          
> udp        0      0 0.0.0.0:5353            0.0.0.0:*                          
> udp        0      0 0.0.0.0:41938           0.0.0.0:*                          
> udp        0      0 0.0.0.0:31229           0.0.0.0:*                          
> udp        0      0 127.0.1.1:53            0.0.0.0:*                          
> udp6       0      0 :::37598                :::*                               
> udp6       0      0 :::5353                 :::*                               
> udp6       0      0 :::12590                :::*                               
> udp6       0      0 :::52638                :::*                               
> udp6       0      0 :::546                  :::*                               
> Active UNIX domain sockets (servers and established)
> 
> This apache server is a tool server hosting web based tools by the SEA
> One of the tools is a backdoor to the system
> 
> The path http://192.168.0.33/tools/sea.php is a back door for the SEA. 
> 
> Here is a screen shot after logging in: 
> 
> From lines 6-15 contain the credentials sea.php:
>     6 $user = 'SEA'; ^M
>     7 $pass = 'SEA'; ^M
>     8 $uselogin = 1;^M
>     9 $sh3llColor = "#0040FF";^M
>    10 ^M
>    11 # MySQL Info ---------^M
>    12 $DBhost = "localhost";^M
>    13 $DBuser = "root";^M
>    14 $DBpass = "root";^M
>    15 #---------------------^M
> 
> 
> So I thought this backdoor might allow root access to the mysql database running on port 3306. But the credentials are set for mysql during setup, and I don't see any other code to run sql queries on the system. Perhaps they just default to root root as that's a very common password combo for mysql installs?

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.