www-apache-bugdb mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Wee Tak <ad...@sphix.com>
Subject general/4172: security violation
Date Tue, 30 Mar 1999 22:15:16 GMT

>Number:         4172
>Category:       general
>Synopsis:       security violation
>Confidential:   no
>Severity:       critical
>Priority:       medium
>Responsible:    apache
>State:          open
>Class:          sw-bug
>Submitter-Id:   apache
>Arrival-Date:   Tue Mar 30 14:20:00 PST 1999
>Originator:     admin@sphix.com
>Release:        1.3.4
Linux sphix.sphix.com 2.0.35 #25 Sat Nov 7 18:33:32 CST 1998 i586  
there might be a posiblity of exploit on apache server 
as i checked , as one of my client website was hacked www.warforge.com
and after checking the analyst i found
user www was login in as user www is apache uid / gid itself it come to me there
might be a posibility of exploit or hack .
also, after scaning other victim of the same hackgroup
all those server are running apache

www.webfringe.com  is running Apache/1.2.6 on Solaris 
www.hackcity.com  is running Apache/1.2.6 512 on FreeBSD 
www.warforge.com  is running Apache/1.3.4 (Unix) PHP/3.0.6 on Linux 
www.hackedworld.com is running Apache/1.2.4 FrontPage/3.0.3 on BSD/OS 
not sure thou its their exploit after all
finding the string for it now , will get back to you imediately after found the string
[In order for any reply to be added to the PR database, ]
[you need to include <apbugs@Apache.Org> in the Cc line ]
[and leave the subject line UNCHANGED.  This is not done]
[automatically because of the potential for mail loops. ]
[If you do not include this Cc, your reply may be ig-   ]
[nored unless you are responding to an explicit request ]
[from a developer.                                      ]
[Reply only with text; DO NOT SEND ATTACHMENTS!         ]

View raw message