Hi,
thanks for all the feedback. I really think this was just a random hit
by someone scanning the internet and I can live with that.
The only thing I'd like to mention is, that the request
- came from a public IP
- the server does not and has never hosted any instance of Guacamole
The latter made me thinking about sending an email to the list because
why would someone go exactly for a path containing `guacamole`. Well it
just might be that the attacker read [this
document](https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf)
from Blackhat 2019 where it is listed as an example on page 80. (btw.
very interesting document...)
Anyway, nothing happened, server is secured let's move to the important
things of life.
Regards
Peter
On 12.09.2019 18:07, Nick Couchman wrote:
On Thu, Sep 12, 2019 at 11:40 AM Der PCFreak <[email protected]
<mailto:[email protected]>> wrote:
Hi,
by accident I found the following in my very reduced Apache SSL
Error logs:
```
[Thu Sep 05 02:35:53 2019] [error] [client xxx.xxx.xxx.xxx]
Invalid URI
in request GET
/dana-na/../dana/html5acc/guacamole/../../../../../../../etc/hosts?/dana/html5acc/guacamole/
HTTP/1.1
```
The thing is, I do not host Guacamole to the public internet,
neither on
this machine.
I just wanted to inform the list, that it might be the case that
someone
found a vulnerability in Guacamole and tries to find public
vulnerable
servers.
First, if you think you've found a vulnerability in Guacamole, please
make sure to report it responsibly:
https://www.apache.org/security/
This involves reporting it *privately* to the project, not publicly on
the lists.
That said, in your case, if your Guacamole instance is not hosted
publicly, then I would be concerned that whatever network it is hosted
on has something bad on it - the kind of attack you're seeing there
looks less like an attack specific to Guacamole and more like a
generic case of someone finding a valid URL and then trying to exploit
a poorly-configured system to get access to system-level files. The
good news, for you, is that it appears that your Apache server is
seeing it as an invalid request. The bad news is that something is
trying to do it in the first place. Whatever client is represented by
the redacted "[client xxx.xxx.xxx.xxx]" should probably be
investigated for malware and/or threat actors present on the system.
-Nick