Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

apache.org hacked

  • 08-05-2000 12:46pm
    #1
    Registered Users, Registered Users 2 Posts: 6,265 ✭✭✭


    from register.co.uk
    Friendly strangers briefly took over the Apache Software Foundation server by exploiting a series of common configuration errors, and then announced their presence by inserting an advertisement for Microsoft at the bottom of the home page. The open-source Apache is the most popular HTTP page server software currently in use.

    The intruders gained root access to Apache.org and could have done considerable damage, including replacing the Apache software offered for download with versions containing a Trojan which would have given them access to servers running all subsequent copies downloaded from the Apache.org Web site.

    In spite of the damage they could have done, they confined themselves to verifying their exploits, fixing one hole in Apache.org's server configuration, and leaving behind a harmless reminder. They also posted the full details of their exploits.

    The intruders originally gained easy access via FTP, discovered a plethora of world-writable directories (tsk, tsk), and installed a simple BIND shell which they could execute remotely via Telnet and from which they learned what services were running and the contents of most directories.

    Apache.org was running the BugZilla bug-tracking software, which requires a Mysql account. They found Mysql available locally and running as user root, though the BugZilla documentation warns against running Mysql as root.

    "We hacked www.apache.org because there are a lot of servers running apache software and if www.apache.org got compromised, somebody could backdoor the apache server source [code] and end up having lots of owned boxes," the intruders said.

    "We just couldn't allow this to happen, we secured the main ftproot==wwwroot thing. While having owned root we just couldn't stand the urge to put that small logo on it."

    The intruders, who go by the aliases {} and Hardbeat, showed a bit of purist pride. "We didn't wanted [sic] to use any buffer overflow or some lame exploit; [our] goal was to reach root with only configuration faults," they explained.

    Apache.org took the exploit in the spirit in which it was meant. "They seemed friendly. It would have been nice if they hadn't put the damned Microsoft logo up, but I guess they had to do something to get attention," Apache Software Foundation director Rasmus Lerdorf said in an interview with CNET.

    "We can only blame ourselves. It's quite embarrassing, but it's a good little heads-up," Lerdorf reportedly said.

    This has to qualify him as the kewlest corporate suit in the known universe.

    to see how they did it look here: http://www.dataloss.net/papers/how.defaced.apache.org.txt

    [This message has been edited by MiCr0 (edited 08-05-2000).]


Comments

Advertisement