GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   r57Shell (https://gfy.com/showthread.php?t=1004054)

MrGusMuller 12-31-2010 05:27 AM

r57Shell
 
Hi u all!

I'm having this issue at programs url.
When I try to access to a promo tool, the link leads me to an URL that gives me access to admin page 'r57Shell'.
This is a little weird!
I get this URL from their NATs program. Anyone trying to access that tool will also see it and my try to cause some troubles i guess...

http://www.dailyfreepornvideos.com/gfy/r57shell.jpg


I havent received any email confirming my subscription to their nats system.
I have sent a support ticket warning them.


Best regards

HomerSimpson 12-31-2010 06:05 AM

webair.com....
why am I not supprised...

directfiesta 12-31-2010 06:30 AM

That shell script gives root acess to your server :

http://www.nullamatix.com/find-r57-a...and-txt-files/

Do a rootkit scan and address this urgently :2 cents:

u-Bob 12-31-2010 06:38 AM

I guess someone needs to reinstall his server....

MrGusMuller 01-01-2011 01:48 AM

I have sent a support mail ...
i will try to talk with the owner here...

MMarko 01-01-2011 03:27 AM

Quote:

Originally Posted by directfiesta (Post 17810704)
That shell script gives root acess to your server :

http://www.nullamatix.com/find-r57-a...and-txt-files/

Do a rootkit scan and address this urgently :2 cents:

Well this isn't true actually... script is basically interface for different linux commands and utilities, and once uploaded you need to exploit something else so you can escalate your priviledges and ran shell script as root... so script alone doesn't mean server was rooted only that you have vulnerable script which allows unauthroized uploads or remote php including.

ladida 01-01-2011 04:19 AM

Quote:

Originally Posted by MMarko (Post 17812070)
Well this isn't true actually... script is basically interface for different linux commands and utilities, and once uploaded you need to exploit something else so you can escalate your priviledges and ran shell script as root... so script alone doesn't mean server was rooted only that you have vulnerable script which allows unauthroized uploads or remote php including.

Truth, except for the vulnerability.

v0id 01-01-2011 05:56 AM

looks like that NATS install is on a virtual plan?

MasterM 01-01-2011 06:26 AM

check your installed scripts for exploits and updates asap.
but probably there are more scripts like that on your server or their server

if its a dedicated and you are the owner.
turn on safe mode... or turn it on temp. before the get deeper

MrGusMuller 01-01-2011 02:36 PM

Its not mine.
I'm just an affiliated.
I'm sent an email to the programs support, added the owner to ICQ and I have sent a message to him here in GFY...
cant get in contact with him.

How does NATs handels with password? I guess that is saved on a database and not encoded by md5 or something :S

u-Bob 01-01-2011 02:40 PM

The attacker was able to install that r57shell script. That does tell you one thing: the server has been compromised. It doesn't tell you how they got in, what they did or what level of access they eventually acquired.

Once you've determined that the server has been compromised, there is one thing you absolutely need to do: wipe and reinstall the server.

While going through your logs, scanning for rootkits, auditing your scripts etc is recommended to find out more information about how they got in. Information you can use to prevent future compromises, but it does not change the fact that the server needs to be reinstalled.

A system that has been compromised is a system that can no longer be trusted.

MrGusMuller 01-01-2011 02:55 PM

The server is not mine.
I'm just a lousy webmaster that registered on the server's owner NATs program, and that the RSS links send me to the r57shell script...

i'm afraid that my password may have been stolen..

MasterM 01-01-2011 03:46 PM

once you got a c99 or r57 shell on the box , you can get all data , logs , databases etc. everything on that box

cooldude7 01-01-2011 04:25 PM

u r screwed

MrGusMuller 01-01-2011 04:27 PM

I'm going to warn that webair guy that uses GFY!...

MrGusMuller 01-01-2011 04:28 PM

Quote:

Originally Posted by cooldude7 (Post 17812868)
u r screwed

me and all the other program's affiliates. :pimp

webair 01-01-2011 04:48 PM

Quote:

Originally Posted by HomerSimpson (Post 17810678)
webair.com....
why am I not supprised...

dick =) :321GFY
------------------------


Looks like they got in via a vulnerable script.
Thanks for the report MrGusMuller and for contacting me. I got my guys on it now.

MrGusMuller 01-01-2011 05:19 PM

I have warned the webair, and few minutes later the problem was corrected.



Now, to anyone who might me interested, the affiliated program was HYPEDOUGH.COM.
I was able to read the wp-config.php and see the username/password for the database.

http://www.dailyfreepornvideos.com/gfy/r57shell2.jpg

MasterM 01-01-2011 06:00 PM

it probably was wordpress which was exploited, last version had vulnerabilities

V_RocKs 01-01-2011 06:04 PM

Usually it is a forum or a support form coded in 1998.

directfiesta 01-01-2011 09:53 PM

Quote:

Originally Posted by V_RocKs (Post 17812963)
Usually it is a forum or a support form coded in 1998.

or a pirated " nulled " script or addon in which the exploit was integrated and became active at the install .

As U-Bob stated, once a box is compromised , it is better to reinstall OS.
Accounts could always be moved to another box, but must be clean of the shell script.

MrGusMuller 01-02-2011 04:45 AM

Quote:

Originally Posted by directfiesta (Post 17813135)
or a pirated " nulled " script or addon in which the exploit was integrated and became active at the install .

As U-Bob stated, once a box is compromised , it is better to reinstall OS.
Accounts could always be moved to another box, but must be clean of the shell script.


The wp-config.php that I have read had STRANGE embebed code!
I'v warned webair guys 'cause no one from HYPE has said anything to me.
Are they on vacations?


Quote:

hypedough
Registered User
Last Activity: Today 09:09 AM

cooldude7 01-02-2011 08:46 AM

Quote:

Originally Posted by MasterM (Post 17812962)
it probably was wordpress which was exploited, last version had vulnerabilities

damn gotta update all wordpress blogs.


All times are GMT -7. The time now is 07:29 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc