You are viewing a plain text version of this content. The canonical link for it is here.
Posted to apache-bugdb@apache.org by Wee Tak <ad...@sphix.com> on 1999/03/31 00:15:16 UTC

general/4172: security violation

>Number:         4172
>Category:       general
>Synopsis:       security violation
>Confidential:   no
>Severity:       critical
>Priority:       medium
>Responsible:    apache
>State:          open
>Class:          sw-bug
>Submitter-Id:   apache
>Arrival-Date:   Tue Mar 30 14:20:00 PST 1999
>Last-Modified:
>Originator:     admin@sphix.com
>Organization:
apache
>Release:        1.3.4
>Environment:
Linux sphix.sphix.com 2.0.35 #25 Sat Nov 7 18:33:32 CST 1998 i586  
>Description:
there might be a posiblity of exploit on apache server 
as i checked , as one of my client website was hacked www.warforge.com
and after checking the analyst i found
user www was login in as user www is apache uid / gid itself it come to me there
might be a posibility of exploit or hack .
also, after scaning other victim of the same hackgroup
all those server are running apache

www.webfringe.com  is running Apache/1.2.6 on Solaris 
www.hackcity.com  is running Apache/1.2.6 512 on FreeBSD 
www.warforge.com  is running Apache/1.3.4 (Unix) PHP/3.0.6 on Linux 
www.hackedworld.com is running Apache/1.2.4 FrontPage/3.0.3 on BSD/OS 
>How-To-Repeat:
not sure thou its their exploit after all
>Fix:
finding the string for it now , will get back to you imediately after found the string
>Audit-Trail:
>Unformatted:
[In order for any reply to be added to the PR database, ]
[you need to include <ap...@Apache.Org> in the Cc line ]
[and leave the subject line UNCHANGED.  This is not done]
[automatically because of the potential for mail loops. ]
[If you do not include this Cc, your reply may be ig-   ]
[nored unless you are responding to an explicit request ]
[from a developer.                                      ]
[Reply only with text; DO NOT SEND ATTACHMENTS!         ]