LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-13-2010, 01:31 PM   #1
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Exclamation Apache Foundation Hit by Targeted XSS Attack


Quote:
Combining a cross-site scripting (XSS) vulnerability with a TinyURL redirect, hackers successfully broke into the infrastructure for the open-source Apache Foundation in what is being described as a "direct, targeted attack."

The hackers hit the server hosting the software that Apache.org uses to it to track issues and requests and stole passwords from all users. The software was hosted on brutus.apache.org, a machine running Ubuntu Linux 8.04 LTS, the group said.

The passwords were encrypted on the compromised servers (SHA-512 hash) but Apache said the risk to simple passwords based on dictionary words "is quite high" and urged users to immediately rotate their passwords. "In addition, if you logged into the Apache JIRA instance between April 6th and April 9th, you should consider the password as compromised, because the attackers changed the login form to log them," Apache said.
Complete Story

Thanks to Slashdot for covering this.
 
Click here to see the post LQ members have rated as the most helpful post in this thread.
Old 04-13-2010, 03:07 PM   #2
rweaver
Senior Member
 
Registered: Dec 2008
Location: Louisville, OH
Distribution: Debian, CentOS, Slackware, RHEL, Gentoo
Posts: 1,833

Rep: Reputation: 167Reputation: 167
Things like this are also a prime reason to never use the same password on two websites. Use a password safe people, unique complex passwords for every site.

(Keepass is pretty full featured if you're unfamiliar with with password safes)
 
2 members found this post helpful.
Old 04-13-2010, 03:11 PM   #3
Web31337
Member
 
Registered: Sep 2009
Location: Russia
Distribution: Gentoo, LFS
Posts: 399
Blog Entries: 71

Rep: Reputation: 65
nice ownage. but they misuse "hacker" term again :'(
 
Old 04-13-2010, 03:56 PM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Thanks for posting. While the web log post is good I recommend reading http://blogs.apache.org/infra/entry/...org_04_09_2010 instead and http://avatraxiom.livejournal.com/102080.html for a short list of of security tips.
 
1 members found this post helpful.
Old 04-13-2010, 03:59 PM   #5
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Original Poster
Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by unSpawn View Post
Thanks for posting. While the web log post is good I recommend reading http://blogs.apache.org/infra/entry/...org_04_09_2010 instead and http://avatraxiom.livejournal.com/102080.html for a short list of of security tips.
Awesome! Thanks!
 
Old 04-14-2010, 01:09 AM   #6
sarajevo
Member
 
Registered: Apr 2005
Distribution: Debian, OpenBSD,Fedora,RedHat
Posts: 228
Blog Entries: 1

Rep: Reputation: 31
SeLinux in this case could prevent a lot of damage. Did they use it ... ? I cannot find anywhere in commnets that it was used.
 
Old 04-14-2010, 10:07 AM   #7
rweaver
Senior Member
 
Registered: Dec 2008
Location: Louisville, OH
Distribution: Debian, CentOS, Slackware, RHEL, Gentoo
Posts: 1,833

Rep: Reputation: 167Reputation: 167
SELinux in this case would have prevented nothing so far as i can see by reading the actual account. I'm interested in see your explanation of what it would have prevented and how.
 
Old 04-17-2010, 03:24 AM   #8
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Quote:
Originally Posted by rweaver View Post
SELinux in this case would have prevented nothing so far as i can see by reading the actual account. I'm interested in see your explanation of what it would have prevented and how.
Since sarajevo has not responded and since you are likely to have more knowledge of SE Linux compared to him, maybe could you come up with one example of where SE Linux could have helped if it were enabled and running in the standard "targeted" configuration? If you would be willing to (thanks!) then to make it easier let's assert the JIRA admin account they gained access to does not equal a root account.
 
Old 04-17-2010, 08:21 AM   #9
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
I too, would like to see such an explanation ... I doubt anyone will be able to give one tho.
 
Old 04-17-2010, 11:16 AM   #10
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
There are areas that SE Linux could have helped. To apply that to this case however requires a lot of ifs and buts because the case shows some errors. This type of error no software can hope to defend against (human errors I mean).
 
Old 04-21-2010, 04:30 PM   #11
rweaver
Senior Member
 
Registered: Dec 2008
Location: Louisville, OH
Distribution: Debian, CentOS, Slackware, RHEL, Gentoo
Posts: 1,833

Rep: Reputation: 167Reputation: 167
Quote:
Originally Posted by unSpawn View Post
This type of error no software can hope to defend against (human errors I mean).
That about sums it up. There are instances where both selinux and apparmor could prevent additional exploits (although reading the article didn't indicate that this particular breach would be one of those), but it can't save you from yourself. No admin is perfect, but having all the security fronts covered that you can reduces the probability of a catastrophic system compromise and sometimes enable you to find a potential security issue before an external entity does.
 
Old 04-21-2010, 05:11 PM   #12
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599Reputation: 3599
Quote:
Originally Posted by rweaver View Post
There are instances where both selinux and apparmor could prevent additional exploits
I wasn't thinking of additional exploits but actual parts of the breach process. Now I don't like guesswork or assumptions as a foundation for explaining things but if I strain myself and assert that 0) JIRA admin does not equal root and 1) daemon processes run in the JIRA context, then there's at least three points I can think of right now:
- changing the upload attachment path (right after bruting login.jsp got them JIRA admin access) wouldn't allow access outside of the JIRA context,
- browsing the file system (after uploading the JSP filesystem browser) wouldn't be possible outside of the JIRA context,
- running the JSP backdoor wouldn't be allowed to bind to a port that isn't in the allowed list of ports for the JIRA context.
It's hypothetical, minor fersure and maybe insignificant as well and it could only have slowed down progress if they didn't have a backup plan and tools in place but at least I came up with something instead of elaborating on the human error part which aspect I already did cover.
 
1 members found this post helpful.
Old 04-22-2010, 09:33 AM   #13
H_TeXMeX_H
LQ Guru
 
Registered: Oct 2005
Location: $RANDOM
Distribution: slackware64
Posts: 12,928
Blog Entries: 2

Rep: Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301Reputation: 1301
I was reading this article recently that found human error or the human factor to be the weakest link in any security scheme. You can have all the technology you want to try to secure yourself, but if you don't know what you're doing or how to use it, it won't do you much good. This actually applies to numerous fields, even medicine, engineering, etc. The most sophisticated technology can't make up for human stupidity or carelessness or lack of understanding.
 
1 members found this post helpful.
Old 05-15-2010, 02:13 AM   #14
sarajevo
Member
 
Registered: Apr 2005
Distribution: Debian, OpenBSD,Fedora,RedHat
Posts: 228
Blog Entries: 1

Rep: Reputation: 31
Quote:
Originally Posted by unSpawn View Post
- changing the upload attachment path (right after bruting login.jsp got them JIRA admin access) wouldn't allow access outside of the JIRA context,
- browsing the file system (after uploading the JSP filesystem browser) wouldn't be possible outside of the JIRA context,
- running the JSP backdoor wouldn't be allowed to bind to a port that isn't in the allowed list of ports for the JIRA context.
Nice explanation. Thanks.

When I wrote above that SeLinux could help to prevent more damage, I thought in case there was ( ??? ) selinux enabled on system, it would prevent compromised user ( JIRA admin ) to read files at rest of system ( unless JIRA admin==root )
But all this unSpawn already wrote above.

Last edited by sarajevo; 05-15-2010 at 02:14 AM.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
apache under attack shafey Linux - Security 2 04-21-2008 06:55 PM
apache log attack rino.caldelli Linux - Security 3 03-05-2006 05:49 PM
Hi, I've got an apache server which keeps crashing when I hit it with a web browser. humbletech99 Linux - Networking 6 11-30-2005 03:06 AM
Apache Server and Hit Counter k1ll3r_x Linux - Software 4 07-05-2005 06:58 AM
Apache XSS prevention abhijeetudas Linux - Security 5 03-22-2005 03:37 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:32 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration