Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

Got 10 VestaCP servers exploited

General questions about VestaCP
Locked
  • Print view
Advanced search
549 posts
  • Page 35 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 33
  • 34
  • 35
  • 36
  • 37
  • …
  • 55
  • Next
snakom23
Posts: 11
Joined: Fri Aug 26, 2016 1:34 pm

Re: Got 10 VestaCP servers exploited

Post by snakom23 » Mon Apr 09, 2018 2:14 pm

isac wrote: ↑
Mon Apr 09, 2018 1:56 pm
We need Debian 9 update, trying to update from 0.9.8 but without luck
the same for me.
Top

pipoy
Posts: 112
Joined: Mon Sep 11, 2017 8:02 am

Os: CentOS 6x
Web: apache
Re: Got 10 VestaCP servers exploited

Post by pipoy » Mon Apr 09, 2018 2:27 pm

RevengeFNF wrote: ↑
Mon Apr 09, 2018 2:13 pm
pipoy wrote: ↑
Mon Apr 09, 2018 2:09 pm
Isn't by default that when your firewall is enabled, everything is dropped?

And by default, only the accepted ones are in the FIREWALL tab.

If you already changed your admin port, automatically your 8083 is dropped

I really dont think the exploitation is related to 8083. Mine is a different port but I got hacked
Did you install VestaCP recently?
We are trying to know if their repo was exploited.
My vestas are 3 months old
Top

RevengeFNF
Posts: 92
Joined: Sat Aug 02, 2014 6:50 pm

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by RevengeFNF » Mon Apr 09, 2018 2:29 pm

pipoy wrote: ↑
Mon Apr 09, 2018 2:27 pm
My vestas are 3 months old
That is very strange. How the hell they exploited your server?

In my case, i have three servers with Vesta, none of them was exploited. In the most important one, i did have port 8083 blocked with iptables
Then i have one test server where i installed Vesta last week, and that one was indeed exploited.
Top

pipoy
Posts: 112
Joined: Mon Sep 11, 2017 8:02 am

Os: CentOS 6x
Web: apache
Re: Got 10 VestaCP servers exploited

Post by pipoy » Mon Apr 09, 2018 2:43 pm

RevengeFNF wrote: ↑
Mon Apr 09, 2018 2:29 pm
pipoy wrote: ↑
Mon Apr 09, 2018 2:27 pm
My vestas are 3 months old
That is very strange. How the hell they exploited your server?

In my case, i have three servers with Vesta, none of them was exploited. In the most important one, i did have port 8083 blocked with iptables
Then i have one test server where i installed Vesta last week, and that one was indeed exploited.

My question is how did they know we are using vesta?

I never gave away my links here in the forum.
Top

n0x
Posts: 16
Joined: Sat Apr 07, 2018 10:30 pm

Os: Ubuntu 15x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by n0x » Mon Apr 09, 2018 2:43 pm

RevengeFNF wrote: ↑
Mon Apr 09, 2018 2:13 pm
Did you install VestaCP recently?
We are trying to know if their repo was exploited.
I don't think it was the repo - I had installations that were made 3 months ago and last updated in Jan 2018 suddenly get exploited around mid-day on Saturday 7th April.

This is almost definitely a vulnerability within the code, I would guess it allowed a malicious user to access the 'admin' account and execute given the update 0.9.8-20 that was released:

Code: Select all

Hardening password checks
Auth fix
Be interesting to know what was fixed without having to go through the code for a comparison to 0.9.8-19.
Top

n0x
Posts: 16
Joined: Sat Apr 07, 2018 10:30 pm

Os: Ubuntu 15x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by n0x » Mon Apr 09, 2018 2:45 pm

pipoy wrote: ↑
Mon Apr 09, 2018 2:43 pm
RevengeFNF wrote: ↑
Mon Apr 09, 2018 2:29 pm
pipoy wrote: ↑
Mon Apr 09, 2018 2:27 pm
My vestas are 3 months old
That is very strange. How the hell they exploited your server?

In my case, i have three servers with Vesta, none of them was exploited. In the most important one, i did have port 8083 blocked with iptables
Then i have one test server where i installed Vesta last week, and that one was indeed exploited.

My question is how did they know we are using vesta?

I never gave away my links here in the forum.
They'll have discovered an exploit in Vesta code base and just run a port scan across IP blocks (probably start with large VM providers like AWS, DO and OVH) for servers with 8083 open and respond with Vesta headers.
Top

RevengeFNF
Posts: 92
Joined: Sat Aug 02, 2014 6:50 pm

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by RevengeFNF » Mon Apr 09, 2018 2:46 pm

pipoy wrote: ↑
Mon Apr 09, 2018 2:43 pm
RevengeFNF wrote: ↑
Mon Apr 09, 2018 2:29 pm
pipoy wrote: ↑
Mon Apr 09, 2018 2:27 pm
My vestas are 3 months old
That is very strange. How the hell they exploited your server?

In my case, i have three servers with Vesta, none of them was exploited. In the most important one, i did have port 8083 blocked with iptables
Then i have one test server where i installed Vesta last week, and that one was indeed exploited.

My question is how did they know we are using vesta?

I never gave away my links here in the forum.
The most common way is to ping port 8083. I don't know any other software that uses that port by default.

If they are exploiting servers even with that port blocked, the only way iam currently imagining, is for the Vesta Repo to have been also compromised.
Their repo is also using VestaCP.
Top

RevengeFNF
Posts: 92
Joined: Sat Aug 02, 2014 6:50 pm

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by RevengeFNF » Mon Apr 09, 2018 2:50 pm

n0x wrote: ↑
Mon Apr 09, 2018 2:43 pm
RevengeFNF wrote: ↑
Mon Apr 09, 2018 2:13 pm
Did you install VestaCP recently?
We are trying to know if their repo was exploited.
I don't think it was the repo - I had installations that were made 3 months ago and last updated in Jan 2018 suddenly get exploited around mid-day on Saturday 7th April.

This is almost definitely a vulnerability within the code, I would guess it allowed a malicious user to access the 'admin' account and execute given the update 0.9.8-20 that was released:

Code: Select all

Hardening password checks
Auth fix
Be interesting to know what was fixed without having to go through the code for a comparison to 0.9.8-19.
That doesn't explain how people that did have port 8083 blocked were hacked, because it means there was no access to the Web UI.
Top

pipoy
Posts: 112
Joined: Mon Sep 11, 2017 8:02 am

Os: CentOS 6x
Web: apache
Re: Got 10 VestaCP servers exploited

Post by pipoy » Mon Apr 09, 2018 2:58 pm

RevengeFNF wrote: ↑
Mon Apr 09, 2018 2:50 pm
n0x wrote: ↑
Mon Apr 09, 2018 2:43 pm
RevengeFNF wrote: ↑
Mon Apr 09, 2018 2:13 pm
Did you install VestaCP recently?
We are trying to know if their repo was exploited.
I don't think it was the repo - I had installations that were made 3 months ago and last updated in Jan 2018 suddenly get exploited around mid-day on Saturday 7th April.

This is almost definitely a vulnerability within the code, I would guess it allowed a malicious user to access the 'admin' account and execute given the update 0.9.8-20 that was released:

Code: Select all

Hardening password checks
Auth fix
Be interesting to know what was fixed without having to go through the code for a comparison to 0.9.8-19.
That doesn't explain how people that did have port 8083 blocked were hacked, because it means there was no access to the Web UI.

True. I had a different port in 1 of my server and still got hacked.
Top

Dexter
Posts: 1
Joined: Mon Apr 09, 2018 2:43 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Dexter » Mon Apr 09, 2018 2:59 pm

Am a web developer, I manage a number of Vesta for my clients, I offer hosting for each site I dev, if they what there own vps with a panel and if they don't wanting to pay for e.g Cpanel/plesk they get Vesta.

I manage about 20 Vesta based vps on one of the dedi server I run client vp's on, the dedi server got a /27 ip range, over the month and years I've tweak the Vesta installs with edit I do after installs.

One of the edits I've done is get rid of the default installed Roundcube and Phpadmins and move them to there own vhost under a normal user.

Out of the 20 vesta install 12 of them got hacked all had roundcube pre-install under /webmail, the 8 that did not get hacked had Roundcube running as subdomain vhost of a normal user.

All run Vesta panel on stock port the other diffrent the hacked ones had Roundcube pre-installed on /webmail.

Edit, I know the issue was found out to be a issue with login of the Admin panel, But I thinks its a multi-vector issues.
Top


Locked
  • Print view

549 posts
  • Page 35 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 33
  • 34
  • 35
  • 36
  • 37
  • …
  • 55
  • Next

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password