Post by Dhaupin » Fri Dec 19, 2014 12:31 am

Seems as if there is some kinda download folder issue going on where folks are uploading junkware. In this case its a mass upload of an game from http://gabrielecirulli.com/

To see infected sites:
https://www.google.com/search?q=downloa ... aaa.jpg%22

Nav to your store download folder, then look for these files (they will contain random strings after the filename):

1024.php.jpg.
license.php.jpg.
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.jpg.

Attachments

Source - note pulling assets from github


https://creadev.org | support@creadev.org - Opencart Extensions, Integrations, & Development. Made in the USA.


User avatar
Active Member

Posts

Joined
Tue May 13, 2014 3:45 am
Location - PA

Post by IP_CAM » Fri Dec 19, 2014 12:58 am

Yep, got 'em on several Sites.
I did not touch some of those sites for a long time.

Ernie

My Github OC Site: https://github.com/IP-CAM
5'200 + FREE OC Extensions, on the World's largest private Github OC Repository Archive Site.


User avatar
Legendary Member

Posts

Joined
Tue Mar 04, 2014 1:37 am
Location - Switzerland

Post by granddaddy » Fri Dec 19, 2014 1:50 am

It happened to others. See this thread which contains some steps to protect yourself:
http://forum.opencart.com/viewtopic.php?f=20&t=98644
Basically you need to
1. Ensure you have a proper encryption key in your store settings (older versions had 12345 and some people forgot to change it). Setting a unique key prevents this hack from executing if it manages to upload the files.
2. To prevent the upload of the files, clear out the box in settings called "uploadable file types". That is unless you are actually selling products that require an upload.

Active Member

Posts

Joined
Sat Feb 18, 2012 5:48 pm

Post by Dhaupin » Fri Dec 19, 2014 2:51 am

Aye it comes from the file option, so if you have it on a product thats what i assume to look for. The filetypes are flawed too, they only look for 1 period so things like file.php.jpg (which is actually a script) would still be allowed, example:

Code: Select all

if (!in_array(substr(strrchr($filename, '.'), 1), $allowed)) {
	$json['error'] = $this->language->get('error_filetype');
}
Also, like components of the OC site itself, as well as various store platform functions, this upload function should have a x-robots header to avoid being indexed, snooped, and exposed for intra-domain/client tinkering (or OC data gathering): https://www.google.com/#q=%22product/pr ... 0&filter=0

Code: Select all

X-Robots-Tag: noindex, nofollow, noimageindex, nosnippet, noodp, noarchive
The upload script isnt too complex either, the only validation it has is file name length and the first period of the file type (which fails validate in example above):

Code: Select all

new AjaxUpload('#button-option-1234', {
	action: 'index.php?route=product/product/upload',
..... script continued
Its true that they are "encrypted" with a string, but then we encounter another thought: many people somehow leave their download folder open...perhaps they deleted index.html, perhaps they allow file structure browsing. This means you can literally see the hash. Obviously this is not caused by OpenCart but i assume that is why they attempted. There are enough open download folders being indexed by google (like in first post) to make it slightly worthwhile.

https://creadev.org | support@creadev.org - Opencart Extensions, Integrations, & Development. Made in the USA.


User avatar
Active Member

Posts

Joined
Tue May 13, 2014 3:45 am
Location - PA
Who is online

Users browsing this forum: No registered users and 47 guests