|
Joel (and others): Is there some source (book, website, or this list) that could point us to what to lock down for a "generic install " of Apache created with the i5 http admin wizard. I bought the Apache 2.0 book recommended in other posts, which is pretty deep. For an rpg pgmr, what do we need to do (if anything) to a default server w/rpg cgi and perhaps net.data? I've run the Orginal server for years with no problems, and recently moved to Apache and V5r3. jim franz ----- Original Message ----- From: "Joel Cochran" <jrc@xxxxxxxxxx> To: "Web" <web400@xxxxxxxxxxxx> Sent: Tuesday, February 08, 2005 7:49 AM Subject: [WEB400] AWSTATS Vulnerability! > Hi All, > > I just wanted to share an experience with you that we just went > through. Our Linux WebServer got hacked. It isn't a Linux or Apache > thing, but some of the websites on that server use AWSTATS. Apparently, > there is a vulnerability in AwStats versions 5.0 to 6.2, and only if you > allow updates from the web. > > In a nut shell, the vulnerability allows the user to execute system > commands from an HTTP request. This particular hack reads the Apache > config file and finds all the website root directories. It only needs > to find a single site to exploit the vulnerability, so even other sites > on the machine that do not use AwStats will be affected! It replaces > all the index.* files with a series of index files that look like this: > http://www.twoguysthinking.com > > And if that wasn't enough, it then deletes ALL files and directories in > that website directory tree that contain the letter combination "log". > At first, I thought this meant just deleting the Apache log files, but > then I realized any graphics with the word "logo" in the name were > gone. Then the real fun began: we host a number of BLOG sites. Any web > pages, directories, program files, etc. with the term "blog" in their > names were also gone. Needless to say, we had a great time fixing this > little problem. > > To patch the vulnerability, update AwStats to version 6.3 and/or > dissallow Update from the web by changing the AwStats config file. If > you are not running AwStats or are running it but already do not allow > update from the web, then you should not be vulnerable. > > Joel Cochran > http://www.rpgnext.com > > > _______________________________________________ > This is the Web Enabling the AS400 / iSeries (WEB400) mailing list > To post a message email: WEB400@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/web400 > or email: WEB400-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/web400. > >
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.