Re: [PHP] c99shell

2006-05-01 Thread Edward Vermillion
What flavor of server are you running on (Windows/*nix)? Does this do a root kit too? It seems that at least the system files would be protected from tampering if php is running as an unprivileged user(?maybe??). Although, on *nix at least, I could see that they would be able to at least re

Re: [PHP] c99shell

2006-05-01 Thread Wolf
What I found with my working with trying to lock it down was that I could not do it entirely at the last point of trying. I could only succeed in doing most of it by swapping my apache code. I made my php.ini as secure as possible based off my searches for the system files it was accessing. Have

Re: [PHP] c99shell

2006-05-01 Thread scot
Well, here's what happened here now that I have more details. We had a client with a php calendar installed. The attacker was able to upload c99.txt somehow and basically rename it to tasks.php within this calendar. c99 is amazing with what it can do, I'm no security expert but it blows me away

Re: [PHP] c99shell

2006-05-01 Thread Edward Vermillion
Correct me if I'm wrong on this, but from what I've seen (last hour or so looking through google for c99+php+shell+captain+crunch), it looks like the vulnerability comes from including uploaded files somehow? Or at least allowing files to be uploaded and then accessed with a .php extension

Re: [PHP] c99shell

2006-05-01 Thread Wolf
I got smacked by it as well. File-upload area that they uploaded a .php.rar file and then accessed the sucker (must have reconfigured their browser for handling?). At any rate, my file-upload area now is a file-upload and you can't access it anymore area. It lists it, but... you can't play with

Re: [PHP] c99shell

2006-04-30 Thread Richard Lynch
On Sun, April 30, 2006 12:31 am, scot wrote: > Hi there, > Not sure if this is proper place to post but here it goes. We got > nailed by > someone using c99shell today. They were able to upload and overwrite a > bunch > of index files. I am working on discovering how they were able to get > it on

Re: [PHP] c99shell

2006-04-30 Thread Dave Goodchild
Hey. That is not a good php.ini configuration. 1. display_errors should be disabled in production as it may output path info to the browser. 2. register_globals should be disabled (default in php5) as it allows scripts to be polluted with tainted data. 3. I would also disabled short_open_tags - n

Re: [PHP] c99shell

2006-04-30 Thread Stut
scot wrote: Hi there, Not sure if this is proper place to post but here it goes. We got nailed by someone using c99shell today. They were able to upload and overwrite a bunch of index files. I am working on discovering how they were able to get it on our server. Here's some basic info. I am by n