vb.org Archive

vb.org Archive (https://vborg.vbsupport.ru/index.php)
-   Community Lounge (https://vborg.vbsupport.ru/forumdisplay.php?f=13)
-   -   phpBB virus... look at this.. (https://vborg.vbsupport.ru/showthread.php?t=73196)

chrisroo 12-22-2004 03:06 AM

phpBB virus... look at this..
 
Saw this earlier today

http://searchsecurity.techtarget.co...1036174,00.html

Defaced forums:
http://www.google.com/search?source...verEverNoSanity


Crazy, thats why i use VBB :)

gigg 12-22-2004 03:20 AM

will vbb attacked by webworm also?

chrisroo 12-22-2004 03:39 AM

i doubt it.

Brent H 12-22-2004 04:56 AM

It's a phpbb only worm, I read about this on vbulletin.com earlier in the day.

Dean C 12-22-2004 07:30 AM

No it will not affect vBulletin users :)

kall 12-22-2004 08:09 AM

Quote:

Originally Posted by chrisroo

Are those URLs deliberately not working?

I'm getting dots in the middle that are causing odd URLS in firefox.

HiDeo 12-22-2004 09:30 AM

Some vBulletin forums are defaced :(

SVTBlackLight01 12-22-2004 09:44 AM

Quote:

Originally Posted by kall
Are those URLs deliberately not working?

I'm getting dots in the middle that are causing odd URLS in firefox.

They don't work in IE6 either.

patriotcow 12-22-2004 11:50 AM

<a href="https://www.google.co.uk/search?ie=UTF-8&oe=UTF-8&q=NeverEverNoSanity+WebWorm+generation" target="_blank">http://www.google.co.uk/search?ie=UT...orm+generation</a>

Andrew 12-22-2004 03:12 PM

Quote:

Originally Posted by patriotcow

Wow - I guess it made it to like generation 24 before it stopped spreading. Which means if it each instance infected 12 others there was like 8916100448256 sites that go defaced. Somehow it used the Google search engine to find phpBB sites that it could exploit - I'm glad my other site was using 2.0.11 which was safe from the exploit.

tubedogg 12-22-2004 04:02 PM

Quote:

Originally Posted by kall
Are those URLs deliberately not working?

I'm getting dots in the middle that are causing odd URLS in firefox.

Somebody copied the URLs directly off another forum, it looks like, and therefore the dots in the middle were copied into the linked URL as well.

ericgtr 12-22-2004 04:23 PM

Isn't this a php exploit for versions 4.3.9 and 5.0.2 or is it something different? http://www.hardened-php.net/advisories/012004.txt

Andrew 12-22-2004 04:54 PM

Quote:

Originally Posted by ericgtr
Isn't this a php exploit for versions 4.3.9 and 5.0.2 or is it something different? http://www.hardened-php.net/advisories/012004.txt

No - This was caused by a security loophole found specifically in the phpBB software. The error you're reffering to was a broader PHP error that affected almost all the PHP based bulletin boards.

ericgtr 12-22-2004 07:36 PM

Ouch.. this is what it does once it gets on your server, from news.com

"After it has taken over a site, the worm deletes all HTML, PHP, active server pages (ASP), Java server pages (JSP), and secure HTML pages, and replaces them with the text, "This site is defaced!!! This site is defaced!!! NeverEverNoSanity WebWorm generation X," according to Kaspersky. For "X," the worm inserts a number representing how far the current instance of the program is descended from the original worm release. MSN searches have found 24th generations of the worm."

Makes me wonder if it is able to get past the webroot, wiping out all backups as well.

Andrew 12-22-2004 07:53 PM

I don't think it managed to get past the webroot - Alot of the sites I've seen have been repaired either from main server backups or personal backups of their files.

moethelawn 12-22-2004 08:26 PM

Yeah, I got an email yesterday from the company I bought my server from and they talked about that worm. Good thing I don't use phpBB :)

trackpads 12-22-2004 09:12 PM

phpbb is the best free forum software that is. The fact that this virus spread so fast is a testament to the massive use of it on the internet. In that news.com post it said that their are voer 6,000,000 phpbb's out there. It has its flaws of course and the fact that its code is freely available makes it a good candidate for something like this.

Of course once you move up in needs you have to go to VB :)

trackpads 12-22-2004 09:13 PM

Quote:

Originally Posted by True.Rooster
I don't think it managed to get past the webroot - Alot of the sites I've seen have been repaired either from main server backups or personal backups of their files.

SQL injection I think.

kall 12-22-2004 10:45 PM

Quote:

Originally Posted by tubedogg
Somebody copied the URLs directly off another forum, it looks like, and therefore the dots in the middle were copied into the linked URL as well.

Ahh. Good lateral thinking there. :)

Erwin 12-23-2004 12:39 AM

It's quite amazing really.

The search on Google for "NeverEverNoSanity WebWorm generation" shows this at the moment:

Results 1 - 10 of about 1,480 for NeverEverNoSanity WebWorm generation. (0.10 seconds)

Erwin 12-23-2004 12:42 AM

Doing a search for this - "NeverEverNoSanity WebWorm generation 24"
http://www.google.com/search?hl=en&q...on+24%22&meta=

gives 2 sites that have been infected by Generation 24.

However, no sites come up for "NeverEverNoSanity WebWorm generation 25"

AWS 12-23-2004 01:41 AM

Quote:

Originally Posted by Erwin
Doing a search for this - "NeverEverNoSanity WebWorm generation 24"
http://www.google.com/search?hl=en&q...on+24%22&meta=

gives 2 sites that have been infected by Generation 24.

However, no sites come up for "NeverEverNoSanity WebWorm generation 25"

That's because Google blocked it. If they didn't we'd probably see many more generations.

I run a phpbb forum on a private site and I removed it when a forum I visit was hacked. I don't think it could be found in Google, but, I took no chances and removed it.

Erwin 12-23-2004 03:26 AM

Ahhh... makes sense.

nghiasi 12-23-2004 04:31 AM

hopefully vbulletin won't get into this problem. ;)

Link14716 12-23-2004 04:00 PM

The problem doesn't affect vBulletin. ;)

Anyways, http://www.google.com/search?hl=en&l...22&btnG=Search shows some results now.

EDIT: Seems to go all the way to generation 29 now. Eeek.

AN-net 12-23-2004 05:07 PM

was gaia online attacked cause there is a critical error on their site saying it cant connect to database?

Michael Morris 12-24-2004 08:06 AM

This particular exploit can't hit vbulletin, but you can guarantee there are - for lack of a better word - +++++++s - who are trying to find such an exploit in the vbulletin code. It's how they get their rocks off because finding a girlfriend is completely beyond them.

Floris 12-24-2004 01:32 PM

Quote:

Originally Posted by Michael Morris
This particular exploit can't hit vbulletin, but you can guarantee there are - for lack of a better word - +++++++s - who are trying to find such an exploit in the vbulletin code. It's how they get their rocks off because finding a girlfriend is completely beyond them.

Here are some official reads about the PHP issue pointed out in this thread and the more ontopic issue: phpBB worm.

PHP Vulnerabilities in <= 4.3.9 and <= 5.0.2
http://www.vbulletin.com/forum/showthread.php?t=123531

How to avoid being damaged by the phpBB worm
http://www.vbulletin.com/forum/showthread.php?t=124008

Michael Morris 12-24-2004 10:50 PM

That's for the links Floris.

My comment still stands though - while all known vulnerabilities are patched, that doesn't mean that tomorrow the script-kiddies won't find a hole. It is sad though that some people waste their time destroying other folks work.

One of the regulars at EN World lost his entire campaign site to this worm. Say what you will about the failure to keep backups, it's still sad to see this happen so needlessly.

Erwin 12-25-2004 05:53 AM

Quote:

Originally Posted by Michael Morris
That's for the links Floris.

My comment still stands though - while all known vulnerabilities are patched, that doesn't mean that tomorrow the script-kiddies won't find a hole. It is sad though that some people waste their time destroying other folks work.

One of the regulars at EN World lost his entire campaign site to this worm. Say what you will about the failure to keep backups, it's still sad to see this happen so needlessly.

Always have backups. :)

AWS 12-26-2004 02:16 PM

Quote:

Originally Posted by Erwin
Always have backups. :)

There is a new worm that exploits the safe mode file traversal bug in php versions prior to 4.3.10. It uploads files to /tmp and excutes them. This makes the box a zombie. It joins an irc channel and from there the botmaster can control the box and make it do whatever it is he is going to do with all the zombies he is creating.
Upgrade php to the latest version if you haven't done so already. If you are on a shared host make sure to let the isp know about upgrading. There are other vulns in php and will be more worms like this one to exploit the other bugs.

Smitty 12-26-2004 05:30 PM

Also see http://www.vbulletin.com/forum/showthread.php?t=124159


All times are GMT. The time now is 02:45 AM.

Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.

X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.03106 seconds
  • Memory Usage 1,803KB
  • Queries Executed 10 (?)
More Information
Template Usage:
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (11)bbcode_quote_printable
  • (1)footer
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (6)option
  • (1)post_thanks_navbar_search
  • (1)printthread
  • (32)printthreadbit
  • (1)spacer_close
  • (1)spacer_open 

Phrase Groups Available:
  • global
  • postbit
  • showthread
Included Files:
  • ./printthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/class_bbcode_alt.php
  • ./includes/class_bbcode.php
  • ./includes/functions_bigthree.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • printthread_start
  • bbcode_fetch_tags
  • bbcode_create
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • printthread_post
  • printthread_complete