<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Serious apache formscript security problem in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172279#M748488</link>
    <description>The following threads were triggered by this flaw and should be read to understand what is going on:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=333766" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=333766&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=358250" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=358250&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The sendmail holes have been closed and HP has issues a security bulliten concerning sendmail.&lt;BR /&gt;&lt;BR /&gt;I think this may be an apache issue.&lt;BR /&gt;&lt;BR /&gt;What happens is a spammer finds the location of a cgi formscript(i will attach one).&lt;BR /&gt;&lt;BR /&gt;By running this script directly(it must be rx other to run on web pages) a spammer is able to trick the sendmail server into relaying mail because the mail appears to be local, originating from apache@localhost&lt;BR /&gt;&lt;BR /&gt;I think a new security bulliten needs to be issued on this topic.&lt;BR /&gt;&lt;BR /&gt;Here is what I know:&lt;BR /&gt;&lt;BR /&gt;When my HP-UX server was running apache 1.3.27 from hp depots, this vulnerability was exploited.  Now that its running apache 2.0.48 from depots, the problem does not appear to be happening. &lt;BR /&gt;&lt;BR /&gt;I'm only running one web page hpuxconsulting.com off that server, which is simply experiment to see if i can do it.&lt;BR /&gt;&lt;BR /&gt;On my Linux apache 1.3.27 server the exploit continues. I have blocked the IP addresses of the violators with the iptables firewall.&lt;BR /&gt;&lt;BR /&gt;What I need to know if possible is:&lt;BR /&gt;&lt;BR /&gt;1) How the exploit actually works. What does the spammer do and how can I stop it. Don't post a cookbook to this forum, I'll have hp erase it. Tell me you have a cookbook here so I can give you points and then email me at investmenttool@yahoo.com&lt;BR /&gt;&lt;BR /&gt;2) Does the upgrade from apache 1.3 to apache 2.0 actually solve the problem?&lt;BR /&gt;&lt;BR /&gt;3) Anything else that can help.&lt;BR /&gt;&lt;BR /&gt;You know I'm a liberal point giver. I am indebted in advance for your help. As a result of this issue I've been getting mail boucnes back from aol and yahoo. Its impossible to operate an nsp without good relations with those two providers.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Fri, 23 Jan 2004 10:13:16 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2004-01-23T10:13:16Z</dc:date>
    <item>
      <title>Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172279#M748488</link>
      <description>The following threads were triggered by this flaw and should be read to understand what is going on:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=333766" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=333766&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=358250" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=358250&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The sendmail holes have been closed and HP has issues a security bulliten concerning sendmail.&lt;BR /&gt;&lt;BR /&gt;I think this may be an apache issue.&lt;BR /&gt;&lt;BR /&gt;What happens is a spammer finds the location of a cgi formscript(i will attach one).&lt;BR /&gt;&lt;BR /&gt;By running this script directly(it must be rx other to run on web pages) a spammer is able to trick the sendmail server into relaying mail because the mail appears to be local, originating from apache@localhost&lt;BR /&gt;&lt;BR /&gt;I think a new security bulliten needs to be issued on this topic.&lt;BR /&gt;&lt;BR /&gt;Here is what I know:&lt;BR /&gt;&lt;BR /&gt;When my HP-UX server was running apache 1.3.27 from hp depots, this vulnerability was exploited.  Now that its running apache 2.0.48 from depots, the problem does not appear to be happening. &lt;BR /&gt;&lt;BR /&gt;I'm only running one web page hpuxconsulting.com off that server, which is simply experiment to see if i can do it.&lt;BR /&gt;&lt;BR /&gt;On my Linux apache 1.3.27 server the exploit continues. I have blocked the IP addresses of the violators with the iptables firewall.&lt;BR /&gt;&lt;BR /&gt;What I need to know if possible is:&lt;BR /&gt;&lt;BR /&gt;1) How the exploit actually works. What does the spammer do and how can I stop it. Don't post a cookbook to this forum, I'll have hp erase it. Tell me you have a cookbook here so I can give you points and then email me at investmenttool@yahoo.com&lt;BR /&gt;&lt;BR /&gt;2) Does the upgrade from apache 1.3 to apache 2.0 actually solve the problem?&lt;BR /&gt;&lt;BR /&gt;3) Anything else that can help.&lt;BR /&gt;&lt;BR /&gt;You know I'm a liberal point giver. I am indebted in advance for your help. As a result of this issue I've been getting mail boucnes back from aol and yahoo. Its impossible to operate an nsp without good relations with those two providers.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 23 Jan 2004 10:13:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172279#M748488</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-23T10:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172280#M748489</link>
      <description>As a short term solution:&lt;BR /&gt;&lt;BR /&gt;What about running Bastille and putting apache in a chroot jail?  Would that help?&lt;BR /&gt;&lt;BR /&gt;Help!&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 23 Jan 2004 11:35:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172280#M748489</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-23T11:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172281#M748490</link>
      <description>Steven,&lt;BR /&gt;&lt;BR /&gt;  Not sure I'm following you completely, so I'll only respond with what I do know for sure.&lt;BR /&gt;&lt;BR /&gt;Looks like you've found a 'short term solution' on HP-UX by upgrading to Apache 2.  Bastille only chroot's Apache on HP-UX, so you'd have to do the Linux chroot manually.  Chroot'ing is always a nice second line of defense, but I can't say for sure how much it will help this specific issue.&lt;BR /&gt;&lt;BR /&gt;Hope that helps a little.&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
      <pubDate>Mon, 26 Jan 2004 13:52:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172281#M748490</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2004-01-26T13:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172282#M748491</link>
      <description>Thanks Keith,&lt;BR /&gt;&lt;BR /&gt;I think the fact that I only have one website running on the HP-UX box under apache 2.0 is a pretty poor test group.&lt;BR /&gt;&lt;BR /&gt;I'm thinking about moving the two targeted websites to the HP-UX box and see what happens with continued victimization.&lt;BR /&gt;&lt;BR /&gt;On the short term, the two formscripts that were getting used were only called in one form, so I renamed the script, renamed the call to the script.&lt;BR /&gt;&lt;BR /&gt;Then i monitored the apache error_log and took note of the exploit attempts not associated with a prior load of the page that is supposed to call the cgi script.&lt;BR /&gt;&lt;BR /&gt;Those users are now blocked at the firewall which is a Linux Box.&lt;BR /&gt;&lt;BR /&gt;I'm wondering if anyone else has experienced this problem and if Apache 2.0 fixed it.&lt;BR /&gt;&lt;BR /&gt;I will teach anybody that wants to check how to look for the exploit.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 26 Jan 2004 14:00:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172282#M748491</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-26T14:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172283#M748492</link>
      <description>Careful analysis of the logs show this:&lt;BR /&gt;&lt;BR /&gt;The only web sites exploited were: &lt;BR /&gt;&lt;BR /&gt;Those missing the robots.txt file that stops people from running my cgi scripts.&lt;BR /&gt;&lt;BR /&gt;Looks like I did this to myself with poor security practice.&lt;BR /&gt;&lt;BR /&gt;Bad Sysadmin&lt;BR /&gt;No supper for Steve&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 27 Jan 2004 01:59:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172283#M748492</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-27T01:59:01Z</dc:date>
    </item>
    <item>
      <title>Re: Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172284#M748493</link>
      <description>"FormMail" type scripts have a number of security issues that should be addressed during implementation.  Most notable are failure to validate/cleanse user submitted data, and a configuration that sets up a trust relationship between the web server user and sendmail, without reservation.  This trust relationship effectively bypasses anti-relay rulesets and other sendmail security/anti-spam measures.&lt;BR /&gt;&lt;BR /&gt;The simple fixes are&lt;BR /&gt;1) always validate and cleanse user input&lt;BR /&gt;2) use techniques like "allowed recipients" to mitigate spam and relay abuses.&lt;BR /&gt;&lt;BR /&gt;If you Google for "FormMail security" you'll find a number of references that speak to "how _not_ to do it" and a plethora of suggestions on "how to do it".</description>
      <pubDate>Thu, 29 Jan 2004 16:03:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172284#M748493</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2004-01-29T16:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172285#M748494</link>
      <description>Thanks Chris.&lt;BR /&gt;&lt;BR /&gt;All hail google.&lt;BR /&gt;&lt;BR /&gt;Great suggestion.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 29 Jan 2004 16:05:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172285#M748494</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-01-29T16:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172286#M748495</link>
      <description>I have dropped the number of allowable recipients in a smtp package in sendmail.cf from the standard 100 to 10.&lt;BR /&gt;&lt;BR /&gt;This should make spam very inefficient.&lt;BR /&gt;&lt;BR /&gt;Studying formscript security. I have robots.txt files all over create.&lt;BR /&gt;&lt;BR /&gt;If its in a subdicrecty of the documentroot do the entries need to be adjusted?&lt;BR /&gt;&lt;BR /&gt;does /cgi-bin/ become ../cgi-bin ??&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 03 Feb 2004 14:13:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172286#M748495</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-02-03T14:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172287#M748496</link>
      <description>Thanks to Chris I have found an expliot that I can use to attempt to send mail on all of my scripts.&lt;BR /&gt;&lt;BR /&gt;robots.txt fixes it. There is a new model for cgi scripts that is much more secure. All new scripts will have to be done that way.&lt;BR /&gt;&lt;BR /&gt;All older scripts are being checked.&lt;BR /&gt;&lt;BR /&gt;There was an exploit this morning because I left a html page that refers to a formscript sitting in a backup directory.'&lt;BR /&gt;&lt;BR /&gt;Got to clean up that web server.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 03 Feb 2004 16:29:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172287#M748496</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-02-03T16:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: Serious apache formscript security problem</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172288#M748497</link>
      <description>At the timestamp in this firewall record, there was a failed exploit attempt on my mail server.&lt;BR /&gt;&lt;BR /&gt;jerusalem kernel: IN=eth0 OUT= MAC=00:c0:9f:08:2a:8c:00:20:6f:13:a0:7c:08:00 src=194.204.170.254 DST=66.92.143.194 LEN=56 TOS=0x00 PREC=0x00 TTL=235 ID=48644 PROTO=ICMP TYPE=3 CODE=13 [src=66.92.143.194 DST=194.204.171.226 LEN=60 TOS=0x00 PREC=0x00 TTL=43 ID=17884 DF PROTO=TCP INCOMPLETE [8 bytes] ]&lt;BR /&gt;&lt;BR /&gt;Right after this 500 mails failed to relay because I have relay blocked.&lt;BR /&gt;&lt;BR /&gt;I'm now kind of wondering since I've shut down cgi exploit how this attempt was done.&lt;BR /&gt;&lt;BR /&gt;Chis Caldwell gets a Rabbit if he posts in again.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 03 Feb 2004 17:21:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/serious-apache-formscript-security-problem/m-p/3172288#M748497</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-02-03T17:21:35Z</dc:date>
    </item>
  </channel>
</rss>

