Possible security exploit in 2.5.6

Discussion regarding Joomla! 2.5 security issues.
Forum rules
Forum Rules
Absolute Beginner's Guide to Joomla! <-- please read before posting, this means YOU.
Forum Post Assistant / FPA - If you are serious about wanting help, you will use this tool to help you post.
shannonw
Joomla! Fledgling
Joomla! Fledgling
Posts: 4
Joined: Thu Aug 16, 2012 3:32 am

Possible security exploit in 2.5.6

Postby shannonw » Thu Aug 16, 2012 3:42 am

Hi,

I've found a number of our sites running various versions from 1.6/1.7 up to the current version 2.5.6 appear to have been compromised via the admin template bluestork. It looks like there is a security hole, and in this case it has allowed a hacker to upload some DDOS scripts and attack other servers.

The scripts were uploaded into the /administrator/templates/bluestork/ folder and the main file names were called stph.php and indx.php

Are the Joomla devs or anyone aware of a security hole? If so, is there a fix available or should we simply remove the template entirely from each site to secure the site properly?

Thanks.
Last edited by shannonw on Fri Aug 17, 2012 4:18 am, edited 1 time in total.

shannonw
Joomla! Fledgling
Joomla! Fledgling
Posts: 4
Joined: Thu Aug 16, 2012 3:32 am

Re: Possible security exploit in 2.5.6

Postby shannonw » Thu Aug 16, 2012 5:37 am

UPDATE
I've removed the bluestork templates entirely for now, which seems to be the best option.

FYI, the versions of the affected installs are:
1.6.3
1.7.0
2.5.2
2.5.6

It would be interesting to know how many people were affected by this exploit. Apparently many hosts/datacenters were affected by this last night.

Thanks.

webhostuk
Joomla! Enthusiast
Joomla! Enthusiast
Posts: 148
Joined: Thu Aug 27, 2009 3:05 am
Location: UK
Contact:

Re: Possible security exploit in 2.5.6

Postby webhostuk » Thu Aug 16, 2012 6:14 am

Thank you for the share, I will make sure that our customers are aware of this one if anyone is using this template.
http://www.webhost.UK.Net | Best UK Joomla Hosting!
http://www.webhost.US.Com | Best US Joomla Hosting
One click auto installer for Joomla

User avatar
mandville
Joomla! Master
Joomla! Master
Posts: 13536
Joined: Mon Mar 20, 2006 1:56 am
Location: The Girly Side of Joomla in Sussex

Re: Possible security exploit in 2.5.6

Postby mandville » Thu Aug 16, 2012 8:40 am

1. please visit http://developer.joomla.org/security and follow the instruvtions for notifying the JSST who deal with core vulnerabilities.
2. Please provide logs showing the point of access where these iles were uploaded
3. runs the fpa on the sites and post the results viewtopic.php?f=621&t=582860 or send them to the jsst
4. follow checklist 7

Are all these joomla versions on the same server?
HU2HY- Poor questions = Poor answer
Un requested Help PM's will be added to the foe list and possibly just deleted
{Community.Connect Administrator }{ Showcase & Security forums Moderator}

dragosmv
Joomla! Fledgling
Joomla! Fledgling
Posts: 2
Joined: Thu Aug 16, 2012 8:40 am

Re: Possible security exploit in 2.5.6

Postby dragosmv » Thu Aug 16, 2012 8:51 am

I also had one of my websites suspended because of /administrator/templates/bluestork/stph.php
My ISP suspended my website until this morning when i removed the bluestork template. He also told me he had about 20 websites with this issue.
Big problem is that this template is the default one and i have a lot of Joomla! websites using it... should i remove the template on all of them?

minadreapta
Joomla! Apprentice
Joomla! Apprentice
Posts: 5
Joined: Thu Aug 16, 2012 12:18 pm

Re: Possible security exploit in 2.5.6

Postby minadreapta » Thu Aug 16, 2012 12:21 pm

i can confirm i also had the same problem with several Joomla installations. There were DDOS attacks from some files within bluestork directory.

There was also a file called error.php in there, besides stph.php and indx.php.

User avatar
brian
Joomla! Master
Joomla! Master
Posts: 11275
Joined: Fri Aug 12, 2005 7:19 am
Location: Leeds, UK
Contact:

Re: Possible security exploit in 2.5.6

Postby brian » Thu Aug 16, 2012 12:30 pm

OK Guys before making such statements you really need to understand the basics of web site security

1. The original poster was running out of date, unsupported versions of Joomla with known security issues
2. A hacker after finding a hole needs to place a file on your site so they can do even more nasty things. It makes the hackers life much much easier if they always put their file i the same place on every site that they exploit. So clearly any folder which is part of the core installation of joomla is a good place for them to place their files.

The location of the file does not have any relevance to the location of the hack. In fact it almost certainly means that the folder is not the source of the hole. Think about it if you can write to any folder on the server why would you chose the one with the hole in it. Thats just too obvious

Finally any webhost that says "they have had lots of sites with the same issue" is clearly indicating that their server was exploited and through that a file was placed in every site.

This exploit is therefore either at a server level or most likely through one of the old software version on one of the site and the host doesnt understand how to setup a secure web server where one exploited site doesnt mean that all the sites on the server will e exploited.

Time to get a new host who does understand the basics of secure web hosting and make sure that you keep your own web site up to date.

It is far too easy to blame others when the problem is staring you in the mirror each morning
"Exploited yesterday... Hacked tomorrow"
Blog http://brian.teeman.net/
Joomla Hidden Secrets http://hiddenjoomlasecrets.com/

wohej
Joomla! Fledgling
Joomla! Fledgling
Posts: 1
Joined: Thu Aug 16, 2012 7:16 pm

Re: Possible security exploit in 2.5.6

Postby wohej » Thu Aug 16, 2012 7:25 pm

Wow OP, you have no idea how many hours I wasted this morning investigating this because of your post and the followup comments from others acknowledging the "problem". We didn't get hit at our webservers, I thought it might be due to our rulesets blocking it, but obviously it was not. But some of our colo/dedi clients did. Please don't post before actually confirming that it has been a TESTED hole in the "affected versions".

Jokes on me! Mod, please put a RED TEXT on top saying April fools. Damn.

User avatar
mandville
Joomla! Master
Joomla! Master
Posts: 13536
Joined: Mon Mar 20, 2006 1:56 am
Location: The Girly Side of Joomla in Sussex

Re: Possible security exploit in 2.5.6

Postby mandville » Thu Aug 16, 2012 8:10 pm

wohej, as its not april, there will be no "fool text"
dragosmv + minadreapta both said they had a similar situation.
Brian stated directly what he understands the issue is and would be my next post.
Myself, i pointed out the correct procedure for informing joomla of core exploits, the request for the site reports and of course checklist 7 . Including the statement [ ] Ensure you have the latest version of Joomla for your 1.5 or 2.5 version of Joomla. Delete all files in your Joomla installation, saving a copy of the configuration.php file.

Too many people took offense when we used to post
"Has your site been compromised?
If so, unless you are running the latest version of Joomla, you probably won't get much sympathy from some of the users around here. Why? Because Joomla is amazingly quick to react to security exploits and patches are release when needed, often within hours."

Now, if shannonw would like to post the FPA information, perhaps we can find other security lapses in the site
HU2HY- Poor questions = Poor answer
Un requested Help PM's will be added to the foe list and possibly just deleted
{Community.Connect Administrator }{ Showcase & Security forums Moderator}

shannonw
Joomla! Fledgling
Joomla! Fledgling
Posts: 4
Joined: Thu Aug 16, 2012 3:32 am

Re: Possible security exploit in 2.5.6

Postby shannonw » Thu Aug 16, 2012 10:30 pm

Let me just clarify a few things here:

1) The topic clearly says Possible - not confirmed.
2) Some of the versions that were hacked are current 2.5.6.
3) These sites were in different hosting accounts, on different servers (all running suPHP, mod security, etc).
4) Complete removal of the bluestork template has stopped any further intrusions.

I will get the FPA and log details and report back soon.

Thanks.

Sean Clement
Joomla! Explorer
Joomla! Explorer
Posts: 326
Joined: Fri Oct 13, 2006 8:24 am
Contact:

Re: Possible security exploit in 2.5.6

Postby Sean Clement » Thu Aug 16, 2012 11:39 pm

1: Can't comment (not read the whole thread)
2: It is most likely that the server has been compromised, other sites on the server running vulnerable versions of Joomla or even vulnerable version of other CMSs.
3: There's a number of hacks going around and 90% of the time they all happen because the 'webmaster' hasn't bothered updating installed extensions (along with updating to Joomla 2.5.6, they have websites still on J1.6 & J1.7 (as you stated within your thread)), making it easier for hackers to upload 'PHP shells' to the server as Brian stated. Hackers don't generally upload hacker files to the same location as the exploited 'extension'.
4: Give it time, the 'extension' that allowed the hacker to 'walk in' is still in place, deleting the 'bluestork' template DOESN'T make your website secure.

minadreapta
Joomla! Apprentice
Joomla! Apprentice
Posts: 5
Joined: Thu Aug 16, 2012 12:18 pm

Re: Possible security exploit in 2.5.6

Postby minadreapta » Fri Aug 17, 2012 4:43 am

if the server was compromised how come that all the problem sites are Joomla?
no wordpress, no oscommerce, no other CMSs? no simple html/php websites?

only Joomla websites are compromised.

I am very curious: if the server was compromised, why not upload the shell scripts or the DDOS ones anywhere else but Joomlas?

shannonw
Joomla! Fledgling
Joomla! Fledgling
Posts: 4
Joined: Thu Aug 16, 2012 3:32 am

Re: Possible security exploit in 2.5.6

Postby shannonw » Fri Aug 17, 2012 5:49 am

OK, below is the FPA output from one of the sites running 2.5.6. I've had to protect certain data for obvious reasons, but the script showed no security warnings or errors, and everything was highlighted green. If there is anything showing that is the real reason for the hack, and not the bluestork script, please let me know so all of the sites can be secured properly.

Note: This particular account contains no other CMS or scripts. No changes have been made since the hacking, except for the bluestork template being removed.

Contrary to one of the previous posters, when I have dealt with hacks before (and I've dealt with many over the years with many types of CMSs), most of the time when a hacker uploads files, they are placed in the location where the security flaw has occurred. Why do they need to go to the trouble of putting the files elsewhere? They don't care about covering up the security flaw, they just want to do the damage and move on. Also, like the above user posted, if the hackers had root server access why only pick Joomla sites and only the bluestork folder?

I can understand that hacks can occur easily with installs that haven't been updated, however in this case where some of the sites are running the latest version have been hacked as well, it rang some alarm bells.

After ruling out differing Joomla versions, separate accounts and servers, the only consistent factor between all of the hacks was that they were done in the bluestork folder. This why I started this thread to see if there's a possibility that this template could be the issue.

Last PHP Error(s) Reported :: Forum Post Assistant (v1.2.1) : 17th August 2012 wrote:[09-Jul-2012 01:33:15 UTC] PHP Fatal error: Call to a member function checkAnswer() on a non-object in /home/[color=orange]--protected--/public_html/libraries/cms/form/rule/captcha.php on line 52[/color]
Forum Post Assistant (v1.2.1) : 17th August 2012 wrote:
Basic Environment :: wrote:Joomla! Instance :: Joomla! 2.5.6-Stable (Ember) 19-June-2012
Joomla! Platform :: Joomla Platform 11.4.0-Stable (Brian Kernighan) 03-Jan-2012
Joomla! Configured :: Yes | Read-Only (444) | Owner: --protected-- (uid: 798/gid: 793) | Group: --protected-- (gid: 793) | Valid For: 2.5 and above
Configuration Options :: Offline: 0 | SEF: 1 | SEF Suffix: 0 | SEF ReWrite: 0 | .htaccess/web.config: Yes | GZip: 0 | Cache: 0 | FTP Layer: 0 | SSL: 0 | Error Reporting: default | Site Debug: 0 | Language Debug: 0 | Default Access: 1 | Unicode Slugs: 0 | Database Credentials Present: Yes

Host Configuration :: OS: Linux | OS Version: 2.6.18-408.el5.lve0.8.58PAE | Technology: i686 | Web Server: Apache/2.2.21 (Unix) mod_ssl/2.2.21 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 | Encoding: gzip, deflate | Doc Root: /home/--protected--/public_html | System TMP Writable: Yes

PHP Configuration :: Version: 5.3.9 | PHP API: cgi-fcgi | Session Path Writable: Unknown | Display Errors: 1 | Error Reporting: 22519 | Log Errors To: error_log | Last Known Error: 17th August 2012 14:28:17. | Register Globals: 0 | Magic Quotes: 1 | Safe Mode: 0 | Open Base: | Uploads: 1 | Max. Upload Size: 50M | Max. POST Size: 8M | Max. Input Time: 60 | Max. Execution Time: 30 | Memory Limit: 32M

MySQL Configuration :: Version: 5.1.63-cll (Client:5.1.63) | Host: --protected-- (--protected--) | Collation: latin1_swedish_ci (Character Set: latin1) | Database Size: 916.95 KiB | #of _FPA_TABLE: 81
Detailed Environment :: wrote:PHP Extensions :: Core (5.3.9) | date (5.3.9) | ereg () | libxml () | openssl () | pcre () | sqlite3 (0.7-dev) | zlib (1.1) | bcmath () | calendar () | ctype () | curl () | dom (20031129) | hash (1.0) | filter (0.11.0) | ftp () | gd () | gettext () | SPL (0.2) | iconv () | session () | intl (1.1.0) | json (1.2.1) | mbstring () | mcrypt () | mysql (1.0) | mysqli (0.1) | standard (5.3.9) | Phar (2.0.1) | posix () | pspell () | Reflection ($Revision: 321634 $) | imap () | SimpleXML (0.1) | soap () | sockets () | exif (1.4 $Id: exif.c 321634 2012-01-01 13:15:04Z felipe $) | tidy (2.0) | tokenizer (0.1) | xml () | xmlreader (0.1) | xmlrpc (0.51) | xmlwriter (0.1) | xsl (0.1) | zip (1.9.1) | cgi-fcgi () | timezonedb () | suhosin (0.9.32.1) | PDO (1.0.4dev) | pdo_sqlite (1.0.1) | SQLite (2.0-dev) | pdo_mysql (1.0.2) | ionCube Loader () | Zend Guard Loader () | Zend Engine (2.3.0) |
Potential Missing Extensions ::

Switch User Environment (Experimental) :: PHP CGI: Yes | Server SU: Yes | PHP SU: Yes | Custom SU (LiteSpeed/Cloud/Grid): Yes
Potential Ownership Issues: No
Folder Permissions :: wrote:Core Folders :: images/ (755) | components/ (755) | modules/ (755) | plugins/ (755) | language/ (755) | templates/ (755) | cache/ (755) | logs/ (755) | tmp/ (755) | administrator/components/ (755) | administrator/modules/ (755) | administrator/language/ (755) | administrator/templates/ (755) |

Elevated Permissions (First 10) :: None
Extensions Discovered :: wrote:Components :: SITE :: com_mailto (2.5.0) | com_wrapper (2.5.0) |
Components :: ADMIN :: jVoteSystem (2.05) | com_login (2.5.0) | com_weblinks (2.5.0) | AcePolls (1.0.6) | com_templates (2.5.0) | com_cache (2.5.0) | com_newsfeeds (2.5.0) | com_modules (2.5.0) | com_checkin (2.5.0) | com_categories (2.5.0) | com_cpanel (2.5.0) | com_media (2.5.0) | com_redirect (2.5.0) | com_config (2.5.0) | FlexBanners (2.0.1) | com_plugins (2.5.0) | com_languages (2.5.0) | com_joomlaupdate (2.5.0) | com_banners (2.5.0) | com_search (2.5.0) | com_menus (2.5.0) | com_messages (2.5.0) | com_finder (2.5.0) | com_installer (2.5.0) | com_content (2.5.0) | com_admin (2.5.0) | com_users (2.5.0) |

Modules :: SITE :: mod_breadcrumbs (2.5.0) | mod_footer (2.5.0) | mod_articles_news (2.5.0) | mod_whosonline (2.5.0) | mod_stats (2.5.0) | mod_weblinks (2.5.0) | mod_languages (2.5.0) | mod_articles_popular (2.5.0) | mod_articles_archive (2.5.0) | mod_banners (2.5.0) | AcePolls (1.0.0) | FlexBanners (2.0.1) | mod_articles_categories (2.5.0) | mod_articles_latest (2.5.0) | jVoteSystemModule (1.00) | mod_search (2.5.0) | mod_syndicate (2.5.0) | Simple File Lister v1.0 (1.0) | mod_users_latest (2.5.0) | mod_login (2.5.0) | mod_articles_category (2.5.0) | mod_wrapper (2.5.0) | mod_menu (2.5.0) | mod_related_items (2.5.0) | Simple File Upload v1.3 (for J (1.3) | mod_feed (2.5.0) | mod_custom (2.5.0) | mod_finder (2.5.0) | mod_random_image (2.5.0) |
Modules :: ADMIN :: mod_status (2.5.0) | mod_logged (2.5.0) | mod_quickicon (2.5.0) | mod_title (2.5.0) | mod_version (2.5.0) | mod_submenu (2.5.0) | mod_login (2.5.0) | mod_menu (2.5.0) | mod_popular (2.5.0) | mod_multilangstatus (2.5.0) | mod_feed (2.5.0) | mod_custom (2.5.0) | mod_latest (2.5.0) | mod_toolbar (2.5.0) |

Plugins :: SITE :: plg_content_vote (2.5.0) | plg_content_emailcloak (2.5.0) | plg_content_joomla (2.5.0) | Content - Load AcePolls (1.0.0) | plg_content_loadmodule (2.5.0) | plg_content_pagenavigation (2.5.0) | Content - jVoteSystem (2.00) | plg_content_finder (2.5.0) | plg_content_geshi (2.5.0) | plg_content_pagebreak (2.5.0) | plg_system_log (2.5.0) | plg_system_debug (2.5.0) | plg_system_sef (2.5.0) | plg_system_languagecode (2.5.0) | plg_system_redirect (2.5.0) | System - jVoteSystemDatabase (1.00) | plg_system_highlight (2.5.0) | plg_system_cache (2.5.0) | plg_system_p3p (2.5.0) | plg_system_logout (2.5.0) | plg_system_languagefilter (2.5.0) | plg_system_remember (2.5.0) | plg_editors-xtd_article (2.5.0) | plg_editors-xtd_image (2.5.0) | plg_editors-xtd_readmore (2.5.0) | Button - jVoteSystemButton (2.00) | plg_editors-xtd_pagebreak (2.5.0) | plg_search_content (2.5.0) | plg_search_contacts (2.5.0) | Search - AcePolls (1.0.0) | plg_search_newsfeeds (2.5.0) | plg_search_categories (2.5.0) | plg_search_weblinks (2.5.0) | plg_extension_joomla (2.5.0) | AcePolls - JomSocial (1.0.0) | AcePolls - AlphaUserPoints (1.0.0) | AcePolls - Mighty Touch (1.0.0) | plg_user_joomla (2.5.0) | plg_user_profile (2.5.0) | plg_user_contactcreator (2.5.0) | plg_quickicon_extensionupdate (2.5.0) | plg_quickicon_joomlaupdate (2.5.0) | plg_editors_codemirror (1.0) | plg_editors_tinymce (3.5.2) | plg_finder_content (2.5.0) | plg_finder_contacts (2.5.0) | plg_finder_newsfeeds (2.5.0) | plg_finder_categories (2.5.0) | plg_finder_weblinks (2.5.0) | plg_authentication_ldap (2.5.0) | plg_authentication_joomla (2.5.0) | plg_authentication_gmail (2.5.0) | plg_captcha_recaptcha (2.5.0) |
Templates Discovered :: wrote:Templates :: SITE :: atomic (2.5.0) | beez_20 (2.5.0) | beez5 (2.5.0) | siteground-j16-14 (1.0.0) |
Templates :: ADMIN :: hathor (2.5.0) |

User avatar
mandville
Joomla! Master
Joomla! Master
Posts: 13536
Joined: Mon Mar 20, 2006 1:56 am
Location: The Girly Side of Joomla in Sussex

Re: Possible security exploit in 2.5.6

Postby mandville » Fri Aug 17, 2012 6:35 am

would love to see the fpa from some of your other j sites that you say arent 2.5
without pointing i notice that jVoteSystem, AcePolls, FlexBanners are all out of date
HU2HY- Poor questions = Poor answer
Un requested Help PM's will be added to the foe list and possibly just deleted
{Community.Connect Administrator }{ Showcase & Security forums Moderator}

User avatar
SoftDux
Joomla! Enthusiast
Joomla! Enthusiast
Posts: 223
Joined: Sun Oct 02, 2005 4:39 pm
Location: Johannesburg, South Africa
Contact:

Re: Possible security exploit in 2.5.6

Postby SoftDux » Sat Aug 18, 2012 4:13 pm

Does anyone know (yet?) how this hack was uploaded, seeing as how this is only limited (so far) to Joomla websites, yet every single one have the same file stored in the same place. So this is either the same hacker (perhaps we can compare IP's shortly before the hack) or a botnet script?

minadreapta
Joomla! Apprentice
Joomla! Apprentice
Posts: 5
Joined: Thu Aug 16, 2012 12:18 pm

Re: Possible security exploit in 2.5.6

Postby minadreapta » Sun Aug 19, 2012 8:28 am

from what i can see the files were not uploaded using ftp, and they have not been used from within another account as we use open_basedir on all our servers, suPHP and Apache suEXEC, mod_security rules and other protection methods as well.

there is only one way i can think: uploaded or injected from whitin Joomla somewhere: themes, components, core perhaps. I don't know.

SeeDyX
Joomla! Fledgling
Joomla! Fledgling
Posts: 2
Joined: Sat Aug 18, 2012 8:02 pm

Re: Possible security exploit in 2.5.6

Postby SeeDyX » Sun Aug 19, 2012 9:28 am

I also think, that it came from within Joomla. From the timestamps of the three generated files, I was able to isolate the relevant entries from the access log. So first came error.php, which was added by an IP, that first registered a new user, confirmed the account by registration email, and afterwards did something in:

/administrator/index.php?option=com_templates&task=source.edit [...]

I sent the complete logfile entries to [email protected] , maybe its helpful :)

Can someone else (with a current Joomla) also find these kind of log entries? Cause the Joomla installation affected here is very old (some 1.7 version....)

dragosmv
Joomla! Fledgling
Joomla! Fledgling
Posts: 2
Joined: Thu Aug 16, 2012 8:40 am

Re: Possible security exploit in 2.5.6

Postby dragosmv » Sun Aug 19, 2012 12:37 pm

I think that the Joomla sites affected are those that allowed self registration.
I looked today into my affected Joomla! site and, surprise, this is what i found in users:

Name User Name Enabled Activated User Groups Email Last Visit Date Registration Date ID
alexaalexa alexaalexa Registered Administrator [email protected] 2012-08-02 08:29:19 2012-08-02 06:59:38

So, somehow, this user alexaalexa managed to register as administrator on my website.

SeeDyX
Joomla! Fledgling
Joomla! Fledgling
Posts: 2
Joined: Sat Aug 18, 2012 8:02 pm

Re: Possible security exploit in 2.5.6

Postby SeeDyX » Sun Aug 19, 2012 12:56 pm


Its the same user (only with another mail adress (another number)) here. And he also is in the registered and the admin group.

Sean Clement
Joomla! Explorer
Joomla! Explorer
Posts: 326
Joined: Fri Oct 13, 2006 8:24 am
Contact:

Re: Possible security exploit in 2.5.6

Postby Sean Clement » Sun Aug 19, 2012 7:29 pm

I know within all prior version to Joomla 2.5.4 (so 1.6 & 1.7 etc) all had escalation issues where a user could register within a site and then do some type of SQL Injection to raise their 'Access Level' to 'Super Administrator'.

If you allow/don't want people to register within your websites you can turn registration off by going to 'Users' -> 'User manager' then 'Options'. Look for 'Allow User Registration' and select 'No'. This will stop people from creating an account and then making their account 'Super Admin', additionally updating to the latest version of Joomla (J!2.5.6) would stop 'hackers' from upping their access level.

crispus
Joomla! Fledgling
Joomla! Fledgling
Posts: 1
Joined: Wed Dec 06, 2006 7:08 pm

Re: Possible security exploit in 2.5.6

Postby crispus » Sun Aug 19, 2012 11:25 pm

{removed}
Last edited by mandville on Sun Aug 19, 2012 11:53 pm, edited 1 time in total.
Reason: post removed due to malicious contents

User avatar
mandville
Joomla! Master
Joomla! Master
Posts: 13536
Joined: Mon Mar 20, 2006 1:56 am
Location: The Girly Side of Joomla in Sussex

Re: Possible security exploit in 2.5.6

Postby mandville » Sun Aug 19, 2012 11:53 pm

crispus - please start a NEW topic following the sticky "before you post read this" viewtopic.php?f=621&t=582854 at the top of the forum and do NOT post the entire contents of the file that has been hacked as it MAY AND WILL infect other peoples computers
HU2HY- Poor questions = Poor answer
Un requested Help PM's will be added to the foe list and possibly just deleted
{Community.Connect Administrator }{ Showcase & Security forums Moderator}

evo_webmaster
Joomla! Apprentice
Joomla! Apprentice
Posts: 10
Joined: Wed May 11, 2011 1:22 am

Re: Possible security exploit in 2.5.6

Postby evo_webmaster » Mon Aug 20, 2012 3:10 am

We also have the same problem with alexaalexa being created as an administrator.

I have tried to update from 1.7.3 to the latest, but any attempt to do this appears to disable the backend completely.

Koning-Aap
Joomla! Fledgling
Joomla! Fledgling
Posts: 1
Joined: Mon Aug 20, 2012 8:06 am

Re: Possible security exploit in 2.5.6

Postby Koning-Aap » Mon Aug 20, 2012 8:46 am

We had the same issue and I tracked down the cause.

Fortunately (in our case) this is not an issue with the bluestork template, at first it just seemed like that, but only because it's the default template.

The stph.php and indx.php file are uploaded with the error.php file. And the error.php file is edited from within the admin interface. We traced down the edit to this POST command: POST /administrator/index.php?option=com_templates&layout=edit .
So, the person editing the error.php-file had administrator powers.

All effected Joomla Installs were 1.6.x/1.7.x/2.5.0-2.5.2 . The administrator powers were obtained during registration using a known exploit: http://developer.joomla.org/security/ne ... ation.html , which had been solved since 2.5.3 .

Another possible security issue that can be the cause had been solved since 2.5.5: http://developer.joomla.org/security/ne ... ation.html

If you use 2.5.6 , the error.php-file had probably been edited before the upgrade. Check the user permission mapping table to verify that there are additional users with administrator rights.

I hope this will be of any help to you.

User avatar
brian
Joomla! Master
Joomla! Master
Posts: 11275
Joined: Fri Aug 12, 2005 7:19 am
Location: Leeds, UK
Contact:

Re: Possible security exploit in 2.5.6

Postby brian » Mon Aug 20, 2012 8:49 am

That makes perfect sense.

As you can see from my signature it is easy to be "Exploited yesterday... Hacked tomorrow"
"Exploited yesterday... Hacked tomorrow"
Blog http://brian.teeman.net/
Joomla Hidden Secrets http://hiddenjoomlasecrets.com/

leodc
Joomla! Fledgling
Joomla! Fledgling
Posts: 1
Joined: Mon Aug 20, 2012 9:37 am

Re: Possible security exploit in 2.5.6

Postby leodc » Mon Aug 20, 2012 9:40 am

Same issue..
37.72.171.37 - - [02/Aug/2012:15:24:18 +0200] "POST /administrator/index.php?option=com_templates&layout=edit HTTP/1.1" 303 - "-" "-"
37.72.171.37 - - [02/Aug/2012:15:24:18 +0200] "GET /administrator/index.php?option=com_templates&view=source&layout=edit HTTP/1.1" 200 9017 "-" "-"
and tph.php & indx.php in /administrator/templates/bluestork/ folder...

thwolfi
Joomla! Fledgling
Joomla! Fledgling
Posts: 1
Joined: Tue May 08, 2012 8:59 am

Re: Possible security exploit in 2.5.6

Postby thwolfi » Mon Aug 20, 2012 10:35 am

Today my ISP did block Filestructure of
/administrator/templates/bluestork

of all customers using joomla.

They blocked it because of exzessive DDOS attacks, from within the bluestork path.
ISP will unlock as soon as Joomla has solved the security issue and users have updated to a new version.

Are there any news from the joomla developement team on that?


--------------------------------------------------
Little addition
--------------------------------------------------
using Joomla 2.5.6
ISP is -> metanet.ch
Propably they have more information for the joomla team.
--------------------------------------------------

This security hole seems to be real and is no joke. Since metanet.ch is a very good secure and reliable hoster.


--------------------------------------------------
Solved (Addition 2)
--------------------------------------------------
Problem was the same here.
self registered User (some really also: alexaalexa alexaalexa) did up them to superuser within older joomla 2.5 versions.
Registerdate was 2-3. August.
The last few day's these users did upload changed error.php file,which is responsible for DDOS attacks.
So for those Joomla users which did update to 2.5.6 after the beginning of August and already had a "hacked" SuperUser the problem was already there.

Luckily I did update to 2.5.6 right away and I was not affected ;)
-----------------------------------------------------

With Version 2.5.6 no User can up themselve anymore to a SuperUser.

amurillo72
Joomla! Fledgling
Joomla! Fledgling
Posts: 1
Joined: Mon Aug 20, 2012 2:34 pm

Re: Possible security exploit in 2.5.6

Postby amurillo72 » Mon Aug 20, 2012 2:44 pm

Hi I have the same problem in one of my sites.
My hosting is: agilityhoster.com
Also I have the same super user.


WHat I should I do to correct the problem?

thanks,

Alejandro

User avatar
mandville
Joomla! Master
Joomla! Master
Posts: 13536
Joined: Mon Mar 20, 2006 1:56 am
Location: The Girly Side of Joomla in Sussex

Re: Possible security exploit in 2.5.6

Postby mandville » Mon Aug 20, 2012 4:25 pm

amurillo72 wrote:WHat I should I do to correct the problem?

1. disbale/ban user
2. http://docs.joomla.org/Security_Checkli ... ter_relief
3. http://docs.joomla.org/Security_Checklist_7
HU2HY- Poor questions = Poor answer
Un requested Help PM's will be added to the foe list and possibly just deleted
{Community.Connect Administrator }{ Showcase & Security forums Moderator}

anywhere88
Joomla! Apprentice
Joomla! Apprentice
Posts: 11
Joined: Mon Aug 20, 2012 4:05 pm

Re: Possible security exploit in 2.5.6

Postby anywhere88 » Mon Aug 20, 2012 4:34 pm

Question: is there a way to avoid new admin registrations at a low level?
If there is such a chance, maybe it will help against this kind of hack...


Return to “Security in Joomla! 2.5”

Who is online

Users browsing this forum: No registered users and 10 guests