ET WEB_SERVER WebShell Generic - ASP File Uploaded

Web shells can be used to obtain unauthorized access and can lead to wider network compromise. Consistent use of web shells by Advanced Persistent Threat (APT) and criminal groups has led to a significant number of cyber incidents. This alert describes the frequent use of web shells as an exploitation vector and Check Point’s IPS guidance and relevant IPS protections addressing these threats.

A web shell is a script that can be uploaded to a web server to enable remote administration of the machine. It can be written in any language that the target web server supports. The most commonly observed web shells are written in languages that are widely supported, such as PHP and ASP. Perl, Ruby, Python, and Unix shell scripts are also used. Using network reconnaissance tools, an adversary can identify vulnerabilities that can be exploited and result in the installation of a web shell. For example, these vulnerabilities can exist in content management systems (CMS) or web server software. Once successfully uploaded, an adversary can use the web shell to leverage other exploitation techniques to escalate privileges and to issue commands remotely. These commands are directly linked to the privilege and functionality available to the web server and may include the ability to add, delete, and execute files as well as the ability to run shell commands, further executables, or scripts.

Methods

1.) Web Servers Suspicious File Upload
>>A remote attacker can upload a malicious file to a web server. Successful exploitation could result in the execution of arbitrary code in the security context of the web server.
2.) PHP Web Shell Generic Backdoor
>>An attacker might upload a web shell backdoor to a PHP server. A successful exploitation might allow the attacker to run arbitrary code, or use the server as a bot for further attacks.
3.) PHP print Remote Shell Command Execution
>>A remote command execution vulnerability has been reported in PHP. A remote attacker can exploit this issue by sending a specially crafted HTTP request to an affected server.
4.) PHP GLOBALS Remote File Inclusion
>>A remote File Inclusion vulnerability has been reported in chumpsoft phpQuestionnaire. The vulnerability is due to lack of sanitization for user-supplied data. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. This protection was previously known as PHP Remote File Inclusion.
5.) OpenX Ad Server Backdoor PHP Code Execution
>> A Code Execution vulnerability has been reported in OpenX Ad Server. The vulnerability is due to the existence of a backdoor within the flowplayer-3.1.1.min.js library. A remote attacker could exploit this vulnerability by sending a malicious request to the server. Successful exploitation could result in code execution on the server.
6.)PhpMyAdmin SESSION Superglobal Remote Variable Manipulation
7.) PhpMyAdmin SERVER Superglobal Remote Variable Manipulation
8.) PhpMyAdmin REQUEST Superglobal Remote Variable Manipulation
9.) PhpMyAdmin ENV Superglobal Remote Variable Manipulation
10.)PhpMyAdmin GLOBALS Superglobal Remote Variable Manipulation
>>A remote variable manipulation vulnerability has been reported in PhpMyAdmin. The vulnerability is due to insufficient validation of request parameters. A remote attacker could exploit this vulnerability by sending a malicious request to the server. Successful exploitation could result in modification of superglobal variables.
11.) PHP Web Shells Malicious Known Variables
>> There are known Variables of an attempt to upload a web shell backdoor to a PHP server. A successful exploitation might allow the attacker to run arbitrary code, or use the server as a bot for further attacks.
12.) Multiple PHP Servers SyrianShell Backdoor Command Execution
>>A command execution vulnerability has been reported in multiple PHP servers. The vulnerability is due to the existence of a backdoor file on the PHP server within a specific library. A remote attacker can exploit this vulnerability by sending a request to the malicious backdoor file.
13.) FTP ftpchk3.php File Upload
>>A file upload vulnerability has been reported in FTP servers. The uploaded file is ftpchk3.php which contains a virus. This virus changes all web files, PHP, HTML, Javascript and TPL files in CMS systems to add a malicious script into the site. Successful exploitation of this vulnerability could allow a remote attacker to execute PHP code on a website if the PHP-infected code is running on the affected system.
14.) Horde FTP Server Backdoor Arbitrary PHP Code Execution
>>An arbitrary PHP code execution vulnerability has been reported in Horde FTP server. The vulnerability is due to a backdoor vulnerability in Horde 3.3.12 and Horde Groupware. A remote attacker can exploit this vulnerability via a specially http request. Successful exploitation would allow an attacker to execute arbitrary PHP code on the target.
15.)Web Servers CryptoPHP Backdoor
>>Some free themes for Joomla, WordPress and Drupal CMS include a backdoor to the service. By installing these themes the system administrator installs the CryptoPHP backdoor.

Recommendations

Scan All Files for Malicious Code

If you are running OS level scanning of files on disk, carefully consider which file-types you want to include/exclude. As this scenario shows, attackers can take advantage of your excluded content to hide their code.




  • 5 Users Found This Useful
Was this answer helpful?

Related Articles

ET WEB_SPECIFIC_APPS Possible JBoss JMX Console Beanshell Deployer WAR Upload and Deployment Exploit Attempt

Notice: Monitoring services will be discontinued from March 31st, 2019. This module can be used...

ET SCAN ZmEu Scanner User-Agent Inbound

Notice: Monitoring services will be discontinued from March 31st, 2019. ZmEuZmEu is a computer...

ET WEB_SERVER Microsoft IIS Remote Code Execution (CVE-2017-7269)

Notice: Monitoring services will be discontinued from March 31st, 2019. A vulnerability exists...

ET WEB_SPECIFIC_APPS Possible WP CuckooTap Arbitrary File Download

Notice: Monitoring services will be discontinued from March 31st, 2019. This signature detects...

WEB_SERVER ColdFusion administrator access

Notice: Monitoring services will be discontinued from March 31st, 2019. The ColdFusion...