Feeds

Apache.org owned by white hats

Hacking as a spiritual work of mercy

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Friendly strangers briefly took over the Apache Software Foundation server by exploiting a series of common configuration errors, and then announced their presence by inserting an advertisement for Microsoft at the bottom of the home page.

The open-source Apache is the most popular HTTP page server software currently in use. The intruders gained root access to Apache.org and could have done considerable damage, including replacing the Apache software offered for download with versions containing a Trojan which would have given them access to servers running all subsequent copies downloaded from the Apache.org Web site. In spite of the damage they could have done, they confined themselves to verifying their exploits, fixing one hole in Apache.org's server configuration, and leaving behind a harmless reminder.

They also posted the full details of their exploits. The intruders originally gained easy access via FTP, discovered a plethora of world-writable directories (tsk, tsk), and installed a simple BIND shell which they could execute remotely via Telnet and from which they learned what services were running and the contents of most directories. Apache.org was running the BugZilla bug-tracking software, which requires a Mysql account. They found Mysql available locally and running as user root, though the BugZilla documentation warns against running Mysql as root.

"We hacked www.apache.org because there are a lot of servers running apache software and if www.apache.org got compromised, somebody could backdoor the apache server source [code] and end up having lots of owned boxes," the intruders said. "We just couldn't allow this to happen, we secured the main ftproot==wwwroot thing. While having owned root we just couldn't stand the urge to put that small logo on it." The intruders, who go by the aliases {} and Hardbeat, showed a bit of purist pride.

"We didn't wanted [sic] to use any buffer overflow or some lame exploit; [our] goal was to reach root with only configuration faults," they explained. Apache.org took the exploit in the spirit in which it was meant. "They seemed friendly. It would have been nice if they hadn't put the damned Microsoft logo up, but I guess they had to do something to get attention," Apache Software Foundation director Rasmus Lerdorf said in an interview with CNET. "We can only blame ourselves. It's quite embarrassing, but it's a good little heads-up," Lerdorf reportedly said. This has to qualify him as the kewlest corporate suit in the known universe.

Intelligent flash storage arrays

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.