Security Incidents mailing list archives

Http scanning for cgi based mail-relays.


From: <measl () mfn org>
Date: Wed, 18 Jul 2001 08:17:03 -0500 (CDT)


Greetings.

        Below is an excerpt from one of our http server logs.  Rather
cute, ya?  Just for the record, the skr1pt k1dd1e
("truzoom () aol com") doing the scanning is still online with AOL, even
though (1) AOL was sent copies of email from this kid acknowledging the
scans were his/hers; (b) AOL recieved copies of the full logs; (c) AOL
sent us their standard boilerplate "Thanks for reporting this, we have
dealt with it according to our AUP".

-- 
Yours, 
J.A. Terranson
sysadmin () mfn org

==========================================================================
lsanca1-ar9-189-190.lsanca1.dsl.gtei.net - - [17/Jul/2001:22:45:56 -0500]
"GET /cgi-bin/formmail.cgi?email=eroticascanner () aol com&recipient=
truzoom () aol com&subject=www.mfn.org/cgi-bin/formmail.cgi&msg=Hiya
HTTP/1.0" 404 282 "-" "Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)"



----------------------------------------------------------------------------


This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see:

http://aris.securityfocus.com


Current thread: