Go Back   vb.org Archive > Community Discussions > Forum and Server Management
FAQ Community Calendar Today's Posts Search

Reply
 
Thread Tools Display Modes
  #1  
Old 10-23-2016, 02:27 PM
sattvhelp sattvhelp is offline
 
Join Date: Oct 2016
Posts: 5
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default Admin account compromised

this morning an admin account was compromised on our forum. They then sent out a mass email stating that the forum was promoting a website (which we do not), made changed to allow uploading of php, and then uploaded a php script, this is the script that was uploaded http://binibrahim.com/shells/godshell.txt

we have removed the files that were uploaded, dealt with the account, and think we have set everything back to normal, but are worried what exactly what this script may have done.

has anybody seen this script before, or can see what its meant to do, as we dont want to have missed any back doors that may have been left behind by it
Reply With Quote
  #2  
Old 10-23-2016, 02:45 PM
Dave Dave is offline
 
Join Date: May 2010
Posts: 2,583
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

The script you linked is called a "PHP Shell" or "PHP Backdoor", it allows people to interact with the server/database/any files on the server in any way they want.

Now the question whether there are any backdoors left is hard for us to answer. All it takes is one line of code to act as a backdoor, this can be hidden in any of the thousand(s) of files vBulletin uses.
Reply With Quote
Благодарность от:
TheLastSuperman
  #3  
Old 10-25-2016, 01:08 AM
TheLastSuperman's Avatar
TheLastSuperman TheLastSuperman is offline
Senior Member
 
Join Date: Sep 2008
Location: North Carolina
Posts: 5,844
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Quote:
Originally Posted by sattvhelp View Post
this morning an admin account was compromised on our forum. They then sent out a mass email stating that the forum was promoting a website (which we do not), made changed to allow uploading of php, and then uploaded a php script, this is the script that was uploaded http://binibrahim.com/shells/godshell.txt

we have removed the files that were uploaded, dealt with the account, and think we have set everything back to normal, but are worried what exactly what this script may have done.

has anybody seen this script before, or can see what its meant to do, as we dont want to have missed any back doors that may have been left behind by it
http://binibrahim.com/shells/godshell.txt

^ Please tell me you've already deleted that file OR that the link above is not your site... IF it is your site delete that file promptly and submit a ticket with your Host asking what assistance they can offer (Maldet scan and/or similar will at least help).

- Replace all default files with 100% fresh new files from a brand new .zip you can acquire via https://members.vbulletin.com then check and see what is left i.e. any new files with recent timestamps around the date of the hacking? *Also look for odd named files, I've seen hackers retain timestamps on files i.e. upload a much older file that you would not assume is bad (i.e. been there long enough) and yet it is.
- Run Suspect File Versions from Maintenance in AdminCP.
- Check the plugin table for any new rogue plugins OR any that contain malicious code. Once you confirm none exist then click to save the active plugins (this will rebuild plugin cache.

http://www.vbulletin.com/forum/blogs...ve-been-hacked
http://www.vbulletin.com/forum/artic...vbulletin-site
Reply With Quote
Благодарность от:
rhody401
  #4  
Old 11-01-2016, 02:14 PM
sattvhelp sattvhelp is offline
 
Join Date: Oct 2016
Posts: 5
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Thank you for the information. The link shows the file, i found that link after googling part of the file to try and understand what it was. The file was hosted for around 20 minutes before it was located and removed
Reply With Quote
  #5  
Old 11-02-2016, 10:39 PM
TheLastSuperman's Avatar
TheLastSuperman TheLastSuperman is offline
Senior Member
 
Join Date: Sep 2008
Location: North Carolina
Posts: 5,844
Благодарил(а): 0 раз(а)
Поблагодарили: 0 раз(а) в 0 сообщениях
Default

Quote:
Originally Posted by sattvhelp View Post
Thank you for the information. The link shows the file, i found that link after googling part of the file to try and understand what it was. The file was hosted for around 20 minutes before it was located and removed
That file does what Dave mentioned above i.e.

Quote:
Originally Posted by Dave View Post
The script you linked is called a "PHP Shell" or "PHP Backdoor", it allows people to interact with the server/database/any files on the server in any way they want.

Now the question whether there are any backdoors left is hard for us to answer. All it takes is one line of code to act as a backdoor, this can be hidden in any of the thousand(s) of files vBulletin uses.
So be sure to check for files with modified timestamps or new files on the server, Dave is correct about it taking one line of code or also one file to still allow backdoor access into your site if not the entire server so be sure to double, triple check okay?
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT. The time now is 08:40 PM.


Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2024, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.06579 seconds
  • Memory Usage 2,215KB
  • Queries Executed 13 (?)
More Information
Template Usage:
  • (1)SHOWTHREAD
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (1)ad_showthread_beforeqr
  • (1)ad_showthread_firstpost
  • (1)ad_showthread_firstpost_sig
  • (1)ad_showthread_firstpost_start
  • (3)bbcode_quote
  • (1)footer
  • (1)forumjump
  • (1)forumrules
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (1)navbar
  • (3)navbar_link
  • (120)option
  • (5)post_thanks_box
  • (2)post_thanks_box_bit
  • (5)post_thanks_button
  • (1)post_thanks_javascript
  • (1)post_thanks_navbar_search
  • (2)post_thanks_postbit
  • (5)post_thanks_postbit_info
  • (5)postbit
  • (5)postbit_onlinestatus
  • (5)postbit_wrapper
  • (1)spacer_close
  • (1)spacer_open
  • (1)tagbit_wrapper 

Phrase Groups Available:
  • global
  • inlinemod
  • postbit
  • posting
  • reputationlevel
  • showthread
Included Files:
  • ./showthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/functions_bigthree.php
  • ./includes/class_postbit.php
  • ./includes/class_bbcode.php
  • ./includes/functions_reputation.php
  • ./includes/functions_post_thanks.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_postinfo_query
  • fetch_postinfo
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • showthread_start
  • showthread_getinfo
  • forumjump
  • showthread_post_start
  • showthread_query_postids
  • showthread_query
  • bbcode_fetch_tags
  • bbcode_create
  • showthread_postbit_create
  • postbit_factory
  • postbit_display_start
  • post_thanks_function_post_thanks_off_start
  • post_thanks_function_post_thanks_off_end
  • post_thanks_function_fetch_thanks_start
  • fetch_musername
  • post_thanks_function_fetch_thanks_end
  • post_thanks_function_thanked_already_start
  • post_thanks_function_thanked_already_end
  • postbit_imicons
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • postbit_display_complete
  • post_thanks_function_can_thank_this_post_start
  • post_thanks_function_fetch_thanks_bit_start
  • post_thanks_function_show_thanks_date_start
  • post_thanks_function_show_thanks_date_end
  • post_thanks_function_fetch_thanks_bit_end
  • post_thanks_function_fetch_post_thanks_template_start
  • post_thanks_function_fetch_post_thanks_template_end
  • tag_fetchbit_complete
  • forumrules
  • navbits
  • navbits_complete
  • showthread_complete