Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

Got 10 VestaCP servers exploited

General questions about VestaCP
Locked
  • Print view
Advanced search
549 posts
  • Page 5 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 55
  • Next
StudioMaX
Posts: 33
Joined: Fri Aug 05, 2016 12:17 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by StudioMaX » Sat Apr 07, 2018 8:40 pm

Moderators: please post instructions how to enable logging in all the web interfaces of Vesta (in nginx or Apache) so that those who find this thread after the hacking could temporarily change their configs of the web server and try to catch the requests from the exploit.
Top

sandy
Posts: 90
Joined: Sat Apr 07, 2018 7:06 pm
Contact:
Contact sandy
Website

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by sandy » Sat Apr 07, 2018 8:41 pm

StudioMaX wrote: ↑
Sat Apr 07, 2018 8:36 pm
Just to think: when logging in through the web interface to Vesta, a session file should be created, right? And all of them located in /usr/local/vesta/data/sessions
As I understand the web interface internals, PHP will check that we have "user" variable inside the session (https://github.com/serghey-rodin/vesta/ ... /index.php), otherwise it will redirect to the Login page.
What I mean - I looked through all the session files in notepad, and search them for variable "user", and it exist only in the sessions created by me (my IP address exists in "user_combined_ip" variable). Therefore, this exploit is either not related to the web interface, or it directly calls some public scripts that do not require authorization.
as far as i checked its vesta php and exploit present in vesta core files which are used to perform root tasks.
Top

Prime
Posts: 20
Joined: Sat Apr 07, 2018 8:15 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Prime » Sat Apr 07, 2018 8:45 pm

StudioMaX wrote: ↑
Sat Apr 07, 2018 8:40 pm
Moderators: please post instructions how to enable logging in all the web interfaces of Vesta (in nginx or Apache) so that those who find this thread after the hacking could temporarily change their configs of the web server and try to catch the requests from the exploit.
It should be as easy as editing the nginx configuration for Vesta:

Code: Select all

access_log /usr/local/vesta/log/nginx_access.log compression;
You can find the configuration in "/usr/local/vesta/nginx/conf/nginx.conf" and you need to restart Vesta service after editing the file.

Edit: I stand corrected, just edit the file and append access_log to a file. Right now it's redirected as following in the file "access_log /dev/null main;"
Top

LAlf
Posts: 19
Joined: Sat Feb 04, 2017 11:02 pm

Re: Got 10 VestaCP servers exploited

Post by LAlf » Sat Apr 07, 2018 8:50 pm

I have 3 servers with vestacp, in all servers output trafic (tx) not more 100 kb, but in one server login/password in vesta now incorrect (nobody change it) + inodes use 100%. Its strange.
Top

usr999
Posts: 78
Joined: Sat Jul 25, 2015 3:37 pm

Re: Got 10 VestaCP servers exploited

Post by usr999 » Sat Apr 07, 2018 8:57 pm

Can't delete virus body, after delete it always restored /usr/lib/libudev.so

[root@waterleafshop aparser]# clamscan -ri --remove=yes /usr
LibClamAV Warning: **************************************************
LibClamAV Warning: *** The virus database is older than 7 days! ***
LibClamAV Warning: *** Please update it as soon as possible. ***
LibClamAV Warning: **************************************************
/usr/lib/libudev.so: Unix.Trojan.DDoS_XOR-1 FOUND
/usr/lib/libudev.so: Removed.

----------- SCAN SUMMARY -----------
Known viruses: 6425142
Engine version: 0.99.4
Scanned directories: 6737
Scanned files: 44599
Infected files: 1
Data scanned: 2094.92 MB
Data read: 1385.61 MB (ratio 1.51:1)
Time: 359.764 sec (5 m 59 s)
Top

Prime
Posts: 20
Joined: Sat Apr 07, 2018 8:15 pm

Os: CentOS 6x
Web: apache + nginx
Re: Got 10 VestaCP servers exploited

Post by Prime » Sat Apr 07, 2018 9:00 pm

usr999 wrote: ↑
Sat Apr 07, 2018 8:57 pm
Can't delete virus body, after delete it always restored /usr/lib/libudev.so

[root@waterleafshop aparser]# clamscan -ri --remove=yes /usr
LibClamAV Warning: **************************************************
LibClamAV Warning: *** The virus database is older than 7 days! ***
LibClamAV Warning: *** Please update it as soon as possible. ***
LibClamAV Warning: **************************************************
/usr/lib/libudev.so: Unix.Trojan.DDoS_XOR-1 FOUND
/usr/lib/libudev.so: Removed.

----------- SCAN SUMMARY -----------
Known viruses: 6425142
Engine version: 0.99.4
Scanned directories: 6737
Scanned files: 44599
Infected files: 1
Data scanned: 2094.92 MB
Data read: 1385.61 MB (ratio 1.51:1)
Time: 359.764 sec (5 m 59 s)
Can you do a "ps aux" and share it using like Pastebin? There may be some other script or application that spawn a new one if it's removed.
Top

usr999
Posts: 78
Joined: Sat Jul 25, 2015 3:37 pm

Re: Got 10 VestaCP servers exploited

Post by usr999 » Sat Apr 07, 2018 9:06 pm

Prime wrote: ↑
Sat Apr 07, 2018 9:00 pm
usr999 wrote: ↑
Sat Apr 07, 2018 8:57 pm
Can't delete virus body, after delete it always restored /usr/lib/libudev.so

[root@waterleafshop aparser]# clamscan -ri --remove=yes /usr
LibClamAV Warning: **************************************************
LibClamAV Warning: *** The virus database is older than 7 days! ***
LibClamAV Warning: *** Please update it as soon as possible. ***
LibClamAV Warning: **************************************************
/usr/lib/libudev.so: Unix.Trojan.DDoS_XOR-1 FOUND
/usr/lib/libudev.so: Removed.

----------- SCAN SUMMARY -----------
Known viruses: 6425142
Engine version: 0.99.4
Scanned directories: 6737
Scanned files: 44599
Infected files: 1
Data scanned: 2094.92 MB
Data read: 1385.61 MB (ratio 1.51:1)
Time: 359.764 sec (5 m 59 s)
Can you do a "ps aux" and share it using like Pastebin? There may be some other script or application that spawn a new one if it's removed.
http://dpaste.com/3DZBD8F
Top

sandy
Posts: 90
Joined: Sat Apr 07, 2018 7:06 pm
Contact:
Contact sandy
Website

Os: CentOS 6x
Web: nginx + php-fpm
Re: Got 10 VestaCP servers exploited

Post by sandy » Sat Apr 07, 2018 9:43 pm

Prime wrote: ↑
Sat Apr 07, 2018 9:00 pm
usr999 wrote: ↑
Sat Apr 07, 2018 8:57 pm
Can't delete virus body, after delete it always restored /usr/lib/libudev.so

[root@waterleafshop aparser]# clamscan -ri --remove=yes /usr
LibClamAV Warning: **************************************************
LibClamAV Warning: *** The virus database is older than 7 days! ***
LibClamAV Warning: *** Please update it as soon as possible. ***
LibClamAV Warning: **************************************************
/usr/lib/libudev.so: Unix.Trojan.DDoS_XOR-1 FOUND
/usr/lib/libudev.so: Removed.

----------- SCAN SUMMARY -----------
Known viruses: 6425142
Engine version: 0.99.4
Scanned directories: 6737
Scanned files: 44599
Infected files: 1
Data scanned: 2094.92 MB
Data read: 1385.61 MB (ratio 1.51:1)
Time: 359.764 sec (5 m 59 s)
Can you do a "ps aux" and share it using like Pastebin? There may be some other script or application that spawn a new one if it's removed.
You need to reinstall server os. Even this exploit is fixed by vesta team your server will still get infected
Top

lukapaunovic
Posts: 73
Joined: Sun Dec 03, 2017 6:30 pm

Re: Got 10 VestaCP servers exploited

Post by lukapaunovic » Sat Apr 07, 2018 9:46 pm

we cant install vesta gain until we know for a fact that this has been patched.
so far we don't know where is the breach.
Top

imperio
VestaCP Team
Posts: 7000
Joined: Sat Dec 01, 2012 12:37 pm
Contact:
Contact imperio
Website

Re: Got 10 VestaCP servers exploited

Post by imperio » Sat Apr 07, 2018 9:56 pm

Who can send access to server where a files with virus still exists ?
[email protected]
Top


Locked
  • Print view

549 posts
  • Page 5 of 55
    • Jump to page:
  • Previous
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 55
  • Next

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password