Skip to main content
We are aware of an issue with a recent Apache update that causes proxied sites to return a "421 Misdirected Request" error. Please see the following article for more information and updates:
Websites show 421 Misdirected Request error while using EA Nginx

Fuzz Faster U Fool attacks overloading server with 200s and more

Comments

6 comments

  • cPRex Jurassic Moderator

    Hey there!  Since all the connections seem to be coming from the 195.178.110.159 IP address, I would just block that IP.

    0
  • vander.host

    Sure, I did that already. But will cPanel always respond to every site site's `/file` with `HTTP 200` success on port 2083 across all shared sites? Or am I doing something wrong, since maybe I have forgotten a security setting?

    0
  • quietFinn

    Yes you will get the 200 status code, because it will go to the cPanel login page, that "/file" is ignored.

     

    0
  • cPRex Jurassic Moderator

    Right, this bot is just looking for random URLs on the server.

    0
  • vander.host

    I'm not sure I have articulated the problem good enough, or maybe I just don't really understand how:

    > this bot is just looking for random URLs on the server.

    Let me sketch the scenario again, and then let me re-articulate my concerns.

    - The attack is visible in at `/usr/local/cpanel/logs/access_log`. These are the cPanel logs that return data on cPanel ports 2083 and 2086, not port 80 or 443 logs that return end user website activity.

    - The attack is not visible on "some client's shared host", but rather, the attack is visible on two well known cPanel ports, namely 2083 and 2086.

    - The attack started at 05:22 and ended at 08:21 (thee hours). During these three hours around ~35 000 requests were made:

    30004 requests on port 2083
    5573 requests on port 2086

    4. Of these requests:

    30002 returned HTTP status code 200 (so mostly port 2083)
    5572 returned HTTP status code 301 (so mostly port 2086)
    3 returned HTTP status code 401

    5. Of these requests, not a single one returned a 403 nor did a single request have the full path to any shared server file on the system. Everything is returned at flat files.

    On point 5, for example, at 08:20:49 the attacker was able to 40 times (in 1 second) get 200s:

    195.178.110.159 - - [06/24/2025:08:20:49 -0000] "GET /siteManager HTTP/1.1" 200 0 "-" "Fuzz Faster U Fool v1.5.0-dev" "-" "-" 2083
    195.178.110.159 - - [06/24/2025:08:20:49 -0000] "GET /size-guide HTTP/1.1" 200 0 "-" "Fuzz Faster U Fool v1.5.0-dev" "-" "-" 2083
    195.178.110.159 - - [06/24/2025:08:20:49 -0000] "GET /soderzhanie-1969 HTTP/1.1" 200 0 "-" "Fuzz Faster U Fool v1.5.0-dev" "-" "-" 2083
    195.178.110.159 - - [06/24/2025:08:20:49 -0000] "GET /sor HTTP/1.1" 200 0 "-" "Fuzz Faster U Fool v1.5.0-dev" "-" "-" 2083
    .... 35 more ....

    So here are my concerns again:

    My shared web hosts have protection, WAFs. But since this attackers are coming in at cPanel ports, other than port 80 and 443, why is it they get 200s?

    How am I suppose to detect problems on port 2083 and 2086 if filenames are returned flat?

    Does cPanel proxy all files on those ports, and is that why it returns HTTP 200 for only port 2083?

    > I would just block that IP

    Right. So play cat and mouse until I figure out why cPanel proxies flat files on port 2083 and return 200 instead of 403? I'm glad for the replies but I'm still concerned about the situation.

    Also, I had to manually use NFT to block the attacker, and I get an DoS solutions from cPanel. Let me assure you all our cPanel servers have DoS attacks and I am just happy we have a border firewall.

    0
  • cPRex Jurassic Moderator

    cPanel listens on those ports and presents a login page to users - they are getting the 200 response because it's a successful connection.  This all sounds like normal server behavior to me as it's returning the expected response on those ports.

    0

Please sign in to leave a comment.