Proftpd exploit with plesk
Proftpd exploit with plesk
Hi,
Are people aware of this major exploit with proftpd mentioned on arstechnica?
http://arstechnica.com/business/news/20 ... o-anon.ars
and
http://cve.mitre.org/cgi-bin/cvename.cg ... -2011-4130
Pre 1.3.3g appears to be effected. Any idea of an update being made available?
Are people aware of this major exploit with proftpd mentioned on arstechnica?
http://arstechnica.com/business/news/20 ... o-anon.ars
and
http://cve.mitre.org/cgi-bin/cvename.cg ... -2011-4130
Pre 1.3.3g appears to be effected. Any idea of an update being made available?
Re: Proftpd exploit with plesk
The exploit mentioned is just the same SQL injection that was fixed in 8.6 MU2 (etc etc etc) as discussed here and in the various Plesk advisories.
The "SSH via FTP" mentioned seems to be nothing more than allowing shell access to the FTP user. I don't understand why they specifically mention it. Maybe I've misunderstood.
The ProFTP issue they mention is interesting, as I thought 1.3.3c was safe, but in any case the ART repo has 1.3.4a, I think. However, the exploit requires valid FTP credentials, and so isn't quite as bad as it might be.
Unless I have misunderstood what they were saying, of course.
The "SSH via FTP" mentioned seems to be nothing more than allowing shell access to the FTP user. I don't understand why they specifically mention it. Maybe I've misunderstood.
The ProFTP issue they mention is interesting, as I thought 1.3.3c was safe, but in any case the ART repo has 1.3.4a, I think. However, the exploit requires valid FTP credentials, and so isn't quite as bad as it might be.
Unless I have misunderstood what they were saying, of course.
--------------------------------
<advert>
If you want to rent a UK-based VPS that comes with friendly advice and support from a fellow ART fan, please get in touch.
</advert>
<advert>
If you want to rent a UK-based VPS that comes with friendly advice and support from a fellow ART fan, please get in touch.
</advert>
-
- Atomicorp Staff - Site Admin
- Posts: 8355
- Joined: Wed Dec 31, 1969 8:00 pm
- Location: earth
- Contact:
Re: Proftpd exploit with plesk
Yeah they lack full information. There is no exploit in the newer proftp in the context of this attack. What happened is
1) agent.php was exploitable via an sql injection attack.
2) Around the end of january (25th is the oldest event we've had reported) the attackers launched a worm/botnet/etc that:
2a) Enumerated plesk servers globally
2b) Identified vulnerable plesk servers (8.2 thru 10.3)
2c) Dumped the username and password databases from vulnerable plesk servers
At this point the attackers have all the credentials for the enumerated systems. The next major attack happens in mid february
3) Attack uses the vulnerable agent.php injection to upload bot code via the file manager. Note, this is unauthenticated.
4) about this time people start patching the systems, so the agent.php vector is largely going away.
5) As systems are cleaned & patched, the attackers come back using the authentication data they collected in 2c. The upload vectors are: Plesk file manager, ftp, sftp.
So, no exploit (new anyway) in proftpd. They're just using the legitimate credentials enumerated in january to upload file(s) to the system.
1) agent.php was exploitable via an sql injection attack.
2) Around the end of january (25th is the oldest event we've had reported) the attackers launched a worm/botnet/etc that:
2a) Enumerated plesk servers globally
2b) Identified vulnerable plesk servers (8.2 thru 10.3)
2c) Dumped the username and password databases from vulnerable plesk servers
At this point the attackers have all the credentials for the enumerated systems. The next major attack happens in mid february
3) Attack uses the vulnerable agent.php injection to upload bot code via the file manager. Note, this is unauthenticated.
4) about this time people start patching the systems, so the agent.php vector is largely going away.
5) As systems are cleaned & patched, the attackers come back using the authentication data they collected in 2c. The upload vectors are: Plesk file manager, ftp, sftp.
So, no exploit (new anyway) in proftpd. They're just using the legitimate credentials enumerated in january to upload file(s) to the system.
- mikeshinn
- Atomicorp Staff - Site Admin
- Posts: 4149
- Joined: Thu Feb 07, 2008 7:49 pm
- Location: Chantilly, VA
Re: Proftpd exploit with plesk
And the ASL Plesk WAF protects against the Plesk SQL injection.
Michael Shinn
Atomicorp - Security For Everyone
Atomicorp - Security For Everyone
-
- Long Time Forum Regular
- Posts: 2813
- Joined: Sat Aug 20, 2005 9:30 am
- Location: The Netherlands
Re: Proftpd exploit with plesk
But the ASL Plesk WAF is scheduled for ASL 3.0.20, which is still in testing, right?
Lemonbit Internet Dedicated Server Management
-
- Atomicorp Staff - Site Admin
- Posts: 8355
- Joined: Wed Dec 31, 1969 8:00 pm
- Location: earth
- Contact:
Re: Proftpd exploit with plesk
Yeah, we might publish it today
- mikeshinn
- Atomicorp Staff - Site Admin
- Posts: 4149
- Joined: Thu Feb 07, 2008 7:49 pm
- Location: Chantilly, VA
Re: Proftpd exploit with plesk
3.0.20 has been released.
Michael Shinn
Atomicorp - Security For Everyone
Atomicorp - Security For Everyone
-
- Forum User
- Posts: 67
- Joined: Wed Jun 01, 2005 5:52 pm
Re: Proftpd exploit with plesk
So it's confirmed that agent.php could be used to upload files and not just to leak data?scott wrote:3) Attack uses the vulnerable agent.php injection to upload bot code via the file manager. Note, this is unauthenticated.
-
- Atomicorp Staff - Site Admin
- Posts: 8355
- Joined: Wed Dec 31, 1969 8:00 pm
- Location: earth
- Contact:
Re: Proftpd exploit with plesk
Yes, its a very signifigant vulnerability. You could do anything that plesk can do, without authentication.
-
- Forum User
- Posts: 67
- Joined: Wed Jun 01, 2005 5:52 pm
Re: Proftpd exploit with plesk
I'm inspecting a couple machines... and I see POST requests to agent.php
samples:
To check if there was a leak:
Should do it... if we see a post reply with 1000+bytes reply we can be sure the leak took place right?
I hoped a file upload wasn't possible directly from agent.php
samples:
Code: Select all
./httpsd_access_log.processed:109.206.185.155 XX.XX.XX.XX:8443 - [26/Feb/2012:12:57:51 +0100] "POST /enterprise/control/agent.php HTTP/1.1" 200 1744 "-" " -"
./httpsd_access_log.processed:109.206.185.155 XX.XX.XX.XX:8443 - [26/Feb/2012:21:29:16 +0100] "POST /enterprise/control/agent.php HTTP/1.1" 200 14004 "-" "-"
./httpsd_access_log.processed:109.206.185.155 XX.XX.XX.XX:8443 - [27/Feb/2012:18:23:04 +0100] "POST /enterprise/control/agent.php HTTP/1.1" 200 1744 "-" "-"
./httpsd_access_log.processed:109.206.185.155 XX.XX.XX.XX:8443 - [28/Feb/2012:10:40:52 +0100] "POST /enterprise/control/agent.php HTTP/1.1" 200 14004 "-" "-"
./httpsd_access_log.processed:109.206.185.155 XX.XX.XX.XX:8443 - [28/Feb/2012:12:48:47 +0100] "POST /enterprise/control/agent.php HTTP/1.1" 200 14004 "- " "-"
./httpsd_access_log.processed:109.206.185.155 XX.XX.XX.XX:8443 - [28/Feb/2012:13:00:26 +0100] "POST /enterprise/control/agent.php HTTP/1.1" 200 14004 "-" "-"
./httpsd_access_log.processed.2:64.202.107.236 XX.XX.XX.XX:8443 - [12/Feb/2012:05:15:16 +0100] "POST /enterprise/control/agent.php HTTP/1.1" 200 1868 "-" "Mozilla/5.0 (X11; Linux i686; rv:7.0.1) Gecko/20100101 Firefox/7.0.1"
./httpsd_access_log.processed.3:109.206.185.155 XX.XX.XX.XX:8443 - [10/Feb/2012:15:43:18 +0100] "POST /enterprise/control/agent.php HTTP/1.1" 200 14004 "- " "-"
./httpsd_access_log.processed.4:109.206.185.155 XX.XX.XX.XX:8443 - [09/Feb/2012:14:42:18 +0100] "POST /enterprise/control/agent.php HTTP/1.1" 200 1744 "-" "-"
Code: Select all
cp -R /usr/local/psa/admin/logs /root/plesk_logs
cd /root/plesk_logs/logs
gzip -d httpsd_access_log*.gz
grep 'agent.php' ./*
I hoped a file upload wasn't possible directly from agent.php
-
- Forum User
- Posts: 67
- Joined: Wed Jun 01, 2005 5:52 pm
Re: Proftpd exploit with plesk
add: searching around I see agent.php only mentioned about data leaks...
to upload the file they need to access to .../file-manager/create-file/ or via ftp...
Am I wrong?
to upload the file they need to access to .../file-manager/create-file/ or via ftp...
Am I wrong?
-
- Atomicorp Staff - Site Admin
- Posts: 8355
- Joined: Wed Dec 31, 1969 8:00 pm
- Location: earth
- Contact:
Re: Proftpd exploit with plesk
Yeah that, ftp, or ssh since they can dump out the user db
-
- Forum User
- Posts: 67
- Joined: Wed Jun 01, 2005 5:52 pm
Re: Proftpd exploit with plesk
so: I do not see uploads via ftp, I do not see accesso file manager (or any other file in plesk admin interface), I do not see ssh access...
can we suppose it was just an information leak withou modifications/uploads?
As for now I saw only agent.php references that were not standard... no uploads via ftp... and no plesk logins or other plesk requests...
How can we be sure that agent.php can't modify/upload files and was just able to "leak" infos?
can we suppose it was just an information leak withou modifications/uploads?
As for now I saw only agent.php references that were not standard... no uploads via ftp... and no plesk logins or other plesk requests...
How can we be sure that agent.php can't modify/upload files and was just able to "leak" infos?
-
- Atomicorp Staff - Site Admin
- Posts: 8355
- Joined: Wed Dec 31, 1969 8:00 pm
- Location: earth
- Contact:
Re: Proftpd exploit with plesk
Unless you captured the attack somehow, theres no way to know reallycan we suppose it was just an information leak withou modifications/uploads?
Tough to say unless you've got the whole attack. It could be a recon, it could involve injecting data into the system (say another admin account for example), and recently we had one piece of malware submitted that was written to the filesystem outside of ftp, ssh or the filemanager. I suspect it was via adding a cron job that wrote this file to the disk.can we suppose it was just an information leak withou modifications/uploads?
I couldnt have said that better. Forensics always comes down to "How do you know?"How can we be sure that agent.php can't modify/upload files and was just able to "leak" infos?
-
- Forum User
- Posts: 67
- Joined: Wed Jun 01, 2005 5:52 pm
Re: Proftpd exploit with plesk
Yeah, you are fully right.scott wrote:I couldnt have said that better. Forensics always comes down to "How do you know?"How can we be sure that agent.php can't modify/upload files and was just able to "leak" infos?
But I think it's in Parallels best interests to let us know what can be done with a POST request to agent.php.
Or does anybody that got a server running with plesk before september 2011 have to consider it "rooted"? :/