Administrator User hacked

Author Message

Peter Meyer-Delius

Friday 13 February 2009 5:25:31 am

Yesterday we received this mail:
--------------------------------------------
A new user has registered.

Account information.
Username: xxxx
Email: xxxx@gmx.net

Link to user information:
http://www.xxx.de/ger/content/view/full/15
--------------------------------------------
15 is the Node-ID of the Default Administrator User that is created during the installation-process. Indeed the Username, Password and Email-Adress of this User was changed, but the user was deactivated.
We checked the server log-file and noticed that the page
http://www.xxx.de/site_admin/user/activate/3b61b269963793693cbdd42ee4c9088b
was requested 300 Times with different hash-keys.
We suggest that the attacker somehow managed to change the Administrator User via the registration function and after that tried to activate it with a script which generated the hash-keys.

Has anyone similar experiences or any hints??

Best regards,

Peter

Gaetano Giunta

Friday 13 February 2009 5:50:35 am

Could you please post an issue in the bug tracker, tagged as 'security issue' and add as much information as possible in there (it will be kept private)?

If your analysis is correct, an attacker somehow managed to change an existing user email/password, but not to activate it by clicking on the correct activation code.
This means that either he did not received the email with the validation code because your site is configured not to send those emails, or because the action of modifying the users config did not trigger a generation of a new user-activation key...

It would especially be interesting to get the access logs of the server. Plus the eZP version you are running, of course, and any configuration details.

Principal Consultant International Business
Member of the Community Project Board

Steven E. Bailey

Friday 13 February 2009 6:34:18 am

I don't know if the user activate stuff in your logs is something new or if it is unrelated but for the administrator user, depending on what version of ezpublish you are running and if you have user register enabled, it can be hacked using:

http://packetstormsecurity.org/0812-exploits/ezpublish-escalate.txt

It is important to upgrade.

Certified eZPublish developer
http://ez.no/certification/verify/396111

Available for ezpublish troubleshooting, hosting and custom extension development: http://www.leidentech.com

Peter Meyer-Delius

Wednesday 18 February 2009 6:24:10 am

Thank you for your fast feedback.
We disabled the user-registration and deleted the default admin, so that the ID of the Administrator User is not obvious.
We did not have any attacks again. We will wait and see.

Best regards,

Peter

Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.

eZ debug

Timing: Jan 18 2025 19:21:31
Script start
Timing: Jan 18 2025 19:21:31
Module start 'layout'
Timing: Jan 18 2025 19:21:31
Module start 'content'
Timing: Jan 18 2025 19:21:32
Module end 'content'
Timing: Jan 18 2025 19:21:32
Script end

Main resources:

Total runtime1.0736 sec
Peak memory usage4,096.0000 KB
Database Queries62

Timing points:

CheckpointStart (sec)Duration (sec)Memory at start (KB)Memory used (KB)
Script start 0.00000.0047 587.9063152.6250
Module start 'layout' 0.00470.0027 740.531339.4453
Module start 'content' 0.00741.0648 779.9766597.6094
Module end 'content' 1.07220.0014 1,377.585912.1641
Script end 1.0736  1,389.7500 

Time accumulators:

 Accumulator Duration (sec) Duration (%) Count Average (sec)
Ini load
Load cache0.00350.3262160.0002
Check MTime0.00130.1217160.0001
Mysql Total
Database connection0.00040.041810.0004
Mysqli_queries1.023495.3299620.0165
Looping result0.00050.0505600.0000
Template Total1.044097.220.5220
Template load0.00210.195520.0010
Template processing1.041997.045020.5209
Template load and register function0.00010.013010.0001
states
state_id_array0.00090.084310.0009
state_identifier_array0.00160.148320.0008
Override
Cache load0.00180.1691370.0000
Sytem overhead
Fetch class attribute can translate value0.00060.051630.0002
Fetch class attribute name0.00120.112160.0002
XML
Image XML parsing0.00100.097230.0003
class_abstraction
Instantiating content class attribute0.00000.001160.0000
General
dbfile0.00080.0780230.0000
String conversion0.00000.000540.0000
Note: percentages do not add up to 100% because some accumulators overlap

Templates used to render the page:

UsageRequested templateTemplateTemplate loadedEditOverride
1node/view/full.tplfull/forum_topic.tplextension/sevenx/design/simple/override/templates/full/forum_topic.tplEdit templateOverride template
4content/datatype/view/ezxmltext.tpl<No override>extension/community_design/design/suncana/templates/content/datatype/view/ezxmltext.tplEdit templateOverride template
5content/datatype/view/ezxmltags/line.tpl<No override>design/standard/templates/content/datatype/view/ezxmltags/line.tplEdit templateOverride template
7content/datatype/view/ezxmltags/paragraph.tpl<No override>extension/ezwebin/design/ezwebin/templates/content/datatype/view/ezxmltags/paragraph.tplEdit templateOverride template
2content/datatype/view/ezimage.tpl<No override>extension/sevenx/design/simple/templates/content/datatype/view/ezimage.tplEdit templateOverride template
1print_pagelayout.tpl<No override>extension/community/design/community/templates/print_pagelayout.tplEdit templateOverride template
 Number of times templates used: 20
 Number of unique templates used: 6

Time used to render debug report: 0.0001 secs