meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, June 8th 2020

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 June 2020

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. PHP FastCGI Attacks; Protest Cybersecurity; QNAP Vuln; Blocking Loopback Portscans

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, June 8, 2020 edition of the Sand Center Storm Center's Stormcast.

0:07.0

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:12.0

When you are installing a programming language to be used as part of your web application, let's say PHP, you often have two options. First option being

0:24.7

to use a module that's being loaded with your web server and then your web server essentially

0:31.2

is executing the code or secondly using a mechanism called Fast CGI., with Fast CGI, the web server will send data to your CGI process, which again, could be

0:46.3

PHP across the Loopback interface.

0:50.3

Now, typically, Fast CGI and similar modules should only listen on loopback.

0:56.4

But apparently, that's not always the case.

0:58.7

And as our handler Remko found, the bad guys are actively looking for exposed fast CGI

1:06.1

pHP installs.

1:08.1

And of course, exploitation is trivial, as Remko shows in the examples that he found. In these

1:15.1

examples, the attacker was essentially just sending a FARP archive to the fast CGI install to have

1:23.7

arbitrary code executed. There's no authentication required.

1:29.5

The one tricky part here is, at least for the attacker,

1:32.9

that Fast GGI doesn't always listen on the same port.

1:37.1

Yes, there are some standards.

1:40.1

The instructions that I remember usually suggest port 9,000, but what Remko found was that IP addresses,

1:48.6

he has been tracking for trying to exploit this vulnerability, are essentially scanning port

1:54.6

8,000 through 10,000, so a fairly far range of different port numbers.

2:00.8

He also found first a quick initial scan from one IP address being then followed up with a second

2:09.3

scan from a different IP address.

2:13.0

So the hacker probably has two processes running or multiple processes. Some of them are just doing these initial scans, assembling target lists of hosts that appear

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.