On Tue, Dec 13, 2011 at 10:33 PM, Knute Johnson <apa...@knutejohnson.com>wrote:

> On 12/13/2011 7:12 PM, Yehuda Katz wrote:
>
>> On Tue, Dec 13, 2011 at 9:50 PM, Knute Johnson <apa...@knutejohnson.com
>> <mailto:apache@knutejohnson.**com <apa...@knutejohnson.com>>> wrote:
>>
>>    This showed up in my log today on a Ubuntu server with Apache 2.2.17.
>>        /?file=../../../../../../proc/**__self/environ%00 HTTP Response
>> 200
>>        /?mod=../../../../../../proc/_**_self/environ%00 HTTP Response 200
>>        /?page=../../../../../../proc/**__self/environ%00 HTTP Response
>> 200
>>
>> Thanks.  Is there some kind of application that stores data at these
> locations normally?

Linux. Or more specifically, it looks like it might be trying to attack a
known vulnerability in the Linux Kernel.
See http://lwn.net/Articles/191954/ for more on that.

Explanation:
Let's say your web application loads files based on the (file/mod/page)
query string value from the folder /srv/www/htdocs/pages/ with the
extension .myfile
The attacker's request for

> ../../../../../../proc/__self/environ%00

will be view by your application as

> /srv/www/htdocs/pages/../../../../../../proc/__self/environ%00.myfile

which the application will likely interpret as just

> /proc/__self/environ


Lately I've been getting a bunch of requests for null files, hundreds of
> them.

You might want to look into using a program like Fail2Ban (www.fail2ban.org)
or some other log parser to block them from hitting your server.
The documentation for fail2ban is not incredible, but their support mailing
list is usually responsive.

- Y

Reply via email to