{"id":24019,"date":"2014-03-13T14:42:58","date_gmt":"2014-03-13T20:42:58","guid":{"rendered":"http:\/\/rankexploits.com\/musings\/?p=24019"},"modified":"2014-03-13T15:15:36","modified_gmt":"2014-03-13T21:15:36","slug":"no-shit-sherlock-sks-part-vi","status":"publish","type":"post","link":"https:\/\/rankexploits.com\/musings\/2014\/no-shit-sherlock-sks-part-vi\/","title":{"rendered":"No Shit Sherlock: SkS Part VI"},"content":{"rendered":"<p><a href=\"http:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/03\/Cache.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/03\/Cache-300x196.png\" alt=\"Cache\" width=\"300\" height=\"196\" class=\"alignright size-thumbnail wp-image-24026\" srcset=\"https:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/03\/Cache-300x196.png 300w, https:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/03\/Cache-500x327.png 500w, https:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/03\/Cache-1024x671.png 1024w, https:\/\/rankexploits.com\/musings\/wp-content\/uploads\/2014\/03\/Cache.png 1380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>I&#8217;m supposed to go exercise. And someone sent me the google cache address. Dang you to heck!!!<br \/>\n<a href=\"http:\/\/webcache.googleusercontent.com\/search?q=cache:CsS0DrUo5kgJ:www.skepticalscience.com\/news.php%3Fn%3D2451+&#038;cd=1&#038;hl=en&#038;ct=clnk&#038;gl=us&#038;client=firefox-a\">Part VI.<\/a><\/p>\n<blockquote><p> Authors have the ability to upload images, PDFs, and other supporting files.  It struck Doug that this was the most likely path to corrupting the log file.<\/p>\n<p>This turned out to be not entirely true, because the upload program would not overwrite a file.  If the file already existed, it completed the upload request by adding a numeric suffix to the file name.  But the intuition was right.  <em>A program that could put files into the system was dangerous, even if it was only available to authors and moderators.<\/em><\/p><\/blockquote>\n<p>No shit, Sherlock.<\/p>\n<blockquote><p>Doug immediately asked that that capability be shut down.  The third security risk was now sealed.<\/p><\/blockquote>\n<p>Three: count them three.<\/p>\n<blockquote><p>Thinking on it further, it became apparent that the image upload tool was also a third avenue into accessing the database.  In theory, someone could upload a program, a web page which when accessed would do whatever the uploader wanted it to do.  In this way he could initiate his own database dump, and grab the resulting file.  First, he\u00e2\u20ac\u2122d need to get the database password, but in theory he could get that, too, from another uploaded program.<\/p><\/blockquote>\n<p>No shit, Sherlock. (This is so well know that one can installd a  <a href=\"https:\/\/wordpress.org\/plugins\/timthumb-vulnerability-scanner\/\">Timthumb Vulnerability Scanner<\/a>. It&#8217;s been around since at least <a href=\"http:\/\/blog.sucuri.net\/2011\/10\/timthumb-php-mass-infection-aftermath-part-i.html\">2011<\/a>.)  Anyway, this would be the 4th security hole associated with the &#8216;leak\/hack&#8217;.<\/p>\n<p>Turns out someone did upload a file. It was called either &#8220;temp.php&#8221; or &#8220;temp3.php&#8221;.<\/p>\n<blockquote><p>The rootkit itself was easy to find on the Internet, however, using the parameters it employed as a signature.  It was nothing more than an open source program for navigating a file system and using the shell commands via the web.  It was very easy to use, and conveniently came with translations in English, Portuguese, Spanish, French, Dutch, Italian, Turkish\u00e2\u20ac\u00a6 and German.  It\u00e2\u20ac\u2122s what let the hacker easily find and view the site\u00e2\u20ac\u2122s source code, and also to find the SQL injection logs.<\/p><\/blockquote>\n<p>Well&#8230; yeah. That&#8217;s because the TimThumb vulnerability was well know, had been around for some time, and script kiddies were sharing scripts. <\/p>\n<blockquote><p>It\u00e2\u20ac\u2122s what let the hacker easily find and <em>view the site\u00e2\u20ac\u2122s source code<\/em>, and also to find the SQL injection logs.<\/p>\n<p><em>But how did he get access to John\u00e2\u20ac\u2122s ID? <\/em> [&#8230;]<\/p>\n<p>So how did the hacker get them?  Until we knew that, even with all of the other security holes closed, everything was at risk.<\/p><\/blockquote>\n<p>How about this: He read them in an email John Cook sent to himself at the university? Of John has a stupid one like &#8220;password&#8221; and he guessed? Or it turns out John stored it in clear text in a &#8220;super-secret obscure directory&#8221; and someone ran across it? Or&#8230; Oh. It goes on and on you can read. * (DGH told me to be clearer here.<\/p>\n<p>And the guy&#8217;s name is now &#8220;dieter&#8221;. And SkS tells us how &#8220;dieter&#8221; tricked the SkS system into giving him escallated privileges: He edited his cookie to tell the server he <I>was<\/i> John Cooke. Well, sort of: his cookie told the server he was user #1. Which is how the SkS system recognizes &#8220;John Cook&#8221; or &#8220;the guy will all the admin privileges&#8221;. <\/p>\n<p>But evidently there is more: I guess well have to wait until someone find part VII in cache. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m supposed to go exercise. And someone sent me the google cache address. Dang you to heck!!! Part VI. Authors have the ability to upload images, PDFs, and other supporting files. It struck Doug that this was the most likely path to corrupting the log file. This turned out to be not entirely true, because &hellip; <a href=\"https:\/\/rankexploits.com\/musings\/2014\/no-shit-sherlock-sks-part-vi\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">No Shit Sherlock: SkS Part VI<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[134],"tags":[],"class_list":["post-24019","post","type-post","status-publish","format-standard","hentry","category-politics"],"_links":{"self":[{"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/posts\/24019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/comments?post=24019"}],"version-history":[{"count":0,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/posts\/24019\/revisions"}],"wp:attachment":[{"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/media?parent=24019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/categories?post=24019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rankexploits.com\/musings\/wp-json\/wp\/v2\/tags?post=24019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}