Uploader Plugin Exploited to Upload Scripts Dec 2015
-
Hey guys. This isn’t a complaint, rather advance warning that your product has been exploited by hackers, and it really bit us hard.
Someone uploaded 3 php scripts to our /upload directory on the 9th, and I’m pretty sure FU was responsible because FU had these 3 files registered in it’s “Manage UGC” panel. The items did not have titles or descriptions. the linux ownership of the files was the same as for the website files, and just like other legitimate FU uploads.
One uploaded script was called system.php, and two were called wp_module.zip and wp_module1.zip but were not really zipped, instead just being php script textfiles. I don’t know how these scripts were executed or how they created scripts in other directories. The two scripts which were created are alias82.php (found hidden in squirrelmail folders) and dirs34.php which was hidden in wp-content/upgrade These names are probably randomly generated.
So for about a full day now, a botnet has been sending POST commands to one or the other of those last two scripts, resulting in batches of 30 spam emails going out to our SMTP relay service. We’ve been disabled now for using up all of our allotment of 10k. This is bad because we’re a neighborhood organization and people subscribe to our news, forum posts and email list!
Suggestions for solutions: better rejection of .php scripts as uploads. Checking .zip files to see if they’re really zipped. Enforcing the location of uploads. Custom uploads location. I’d also really like advice for better permissions on our folders. Our current permissions are at the defaults created by virtualmin and wordpress:
/home/%user%/public_html/wp-content/uploads/ /755/750/750/755/755/
Sorry if anything above is unclear. I should have been in bed 6-7 hrs ago. Thanks in advance for your help!
- The topic ‘Uploader Plugin Exploited to Upload Scripts Dec 2015’ is closed to new replies.