<<< Date Index >>>     <<< Thread Index >>>

Re: WebWorm using PHPBB vulnerability in the wild!



This is something that I've wondered about for a while: Given the issues with it, why do the authors of nearly every webapp persist in putting the full version number at the bottom of each page? This, coupled with search engines indexing the pages provides a nice easy directory of sites to hack, or in this case, to exploit with a worm.

Has there been an advisory to this effect?

-Nick Johnson

Niki Denev wrote:

There have been reports of WebWorm exploting PHPBB's urldecode vulnerability.
The worm uses this to create a perl script on the server and start it.
After the perl script starts it wipes itself out, then begans to search
via google.com/advanced_search for exploitable viewtopic.php files part from the vulnerable PHPBB distributions. Then the worm replicates itself by using the vulnerability, and also overwrites any files on the disk that it has permission to. Machines running the worm script will have perl process with name 'm1ho2of' running.
But this likely will change when the people start to notice it.
The possible solution is to patch or disable the vulnerable PHPBB installations.


--niki

------------------------------------------------------------------------

!DSPAM:41c8ef2a143957632644158!