Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

Got 10 VestaCP servers exploited

General questions about VestaCP
Locked
  • Print view
Advanced search
549 posts
  • Page 4 of 55
    • Jump to page:
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 55
  • Next
sandy
Posts: 90
Joined: Sat Apr 07, 2018 7:06 pm
Contact:
Contact sandy
Website

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by sandy » Sat Apr 07, 2018 8:07 pm

viewtopic.php?f=10&t=16558&p=68543
some more info about the attack
Top

lukapaunovic
Posts: 73
Joined: Sun Dec 03, 2017 6:30 pm

Re: Got 10 VestaCP servers exploited

Post by lukapaunovic » Sat Apr 07, 2018 8:11 pm

This matter needs to be looked into by core of VestaCP team immediately.
it's the matter of time when other providers and server will get hacked.
We need fix ASAP
Top

sandy
Posts: 90
Joined: Sat Apr 07, 2018 7:06 pm
Contact:
Contact sandy
Website

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by sandy » Sat Apr 07, 2018 8:17 pm

lukapaunovic wrote: ↑
Sat Apr 07, 2018 8:11 pm
This matter needs to be looked into by core of VestaCP team immediately.
it's the matter of time when other providers and server will get hacked.
We need fix ASAP
some will even suspend the server permanently
Top

Prime
Posts: 20
Joined: Sat Apr 07, 2018 8:15 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Prime » Sat Apr 07, 2018 8:18 pm

While this issue is on-going, I highly urge everyone to change ports of your vestaCP-installation. This to ensure to make it harder for break-in attempts as usually the exploits only target certain ports (in this case, default port.)
Top

sandy
Posts: 90
Joined: Sat Apr 07, 2018 7:06 pm
Contact:
Contact sandy
Website

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by sandy » Sat Apr 07, 2018 8:20 pm

Prime wrote: ↑
Sat Apr 07, 2018 8:18 pm
While this issue is on-going, I highly urge everyone to change ports of your vestaCP-installation. This to ensure to make it harder for break-in attempts as usually the exploits only target certain ports (in this case, default port.)
or :

Code: Select all

service vesta stop
Top

sandy
Posts: 90
Joined: Sat Apr 07, 2018 7:06 pm
Contact:
Contact sandy
Website

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by sandy » Sat Apr 07, 2018 8:24 pm

this time exploit is severe resulting outbound ddos attack. And 99% of hosts doesn't allow it on there network
Top

skid
VestaCP Team
Posts: 1476
Joined: Wed Apr 06, 2011 11:12 pm

Re: Got 10 VestaCP servers exploited

Post by skid » Sat Apr 07, 2018 8:25 pm

sandy wrote: ↑
Sat Apr 07, 2018 8:20 pm
Prime wrote: ↑
Sat Apr 07, 2018 8:18 pm
While this issue is on-going, I highly urge everyone to change ports of your vestaCP-installation. This to ensure to make it harder for break-in attempts as usually the exploits only target certain ports (in this case, default port.)
or :

Code: Select all

service vesta stop
This is the best way to stay safe until we find out the reason and release the update. Thanks for positing it.
Top

skid
VestaCP Team
Posts: 1476
Joined: Wed Apr 06, 2011 11:12 pm

Re: Got 10 VestaCP servers exploited

Post by skid » Sat Apr 07, 2018 8:27 pm

If your server got hacked please send us root access to [email protected] so we can take a look and inspect it. Thanks
Top

Prime
Posts: 20
Joined: Sat Apr 07, 2018 8:15 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Prime » Sat Apr 07, 2018 8:28 pm

sandy wrote: ↑
Sat Apr 07, 2018 8:20 pm
Prime wrote: ↑
Sat Apr 07, 2018 8:18 pm
While this issue is on-going, I highly urge everyone to change ports of your vestaCP-installation. This to ensure to make it harder for break-in attempts as usually the exploits only target certain ports (in this case, default port.)
or :

Code: Select all

service vesta stop
Even better for the moment being:

Code: Select all

systemctl stop vesta && systemctl disable vesta
And when it's fixed:

Code: Select all

systemctl enable vesta && systemctl start vesta
Just in case you need to do a reboot or what not, so the service stays off :)
Top

StudioMaX
Posts: 33
Joined: Fri Aug 05, 2016 12:17 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by StudioMaX » Sat Apr 07, 2018 8:36 pm

Just to think: when logging in through the web interface to Vesta, a session file should be created, right? And all of them located in /usr/local/vesta/data/sessions
As I understand the web interface internals, PHP will check that we have "user" variable inside the session (https://github.com/serghey-rodin/vesta/ ... /index.php), otherwise it will redirect to the Login page.
What I mean - I looked through all the session files in notepad, and search them for variable "user", and it exist only in the sessions created by me (my IP address exists in "user_combined_ip" variable). Therefore, this exploit is either not related to the web interface, or it directly calls some public scripts that do not require authorization.
Top


Locked
  • Print view

549 posts
  • Page 4 of 55
    • Jump to page:
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 55
  • Next

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password