[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Evil script tags appearing in HTML code from IIS box (www.heiheinn.cn)

Posted on 2008-06-18
4
Medium Priority
?
582 Views
Last Modified: 2012-06-27
Hi chaps,

We've been asked to look at an IIS server which has recently started rendering web pages with "script src = http://www.heiheinn.cn/k.js >< / script " inserted in to the A tags. This results in people being bombarded with a series of popups when they visit the pages being displayed.

The server itself is fairly well secured, with only port 80 and 443 and 21 open to the web and is behind a VPN to which only a few people have access. There's no sign of anything in the ftp logs.

My recommendation so far is to blow the box away and restore from backups. My concern though was heightened when I searched on google for the website of the evil JS code (www.heiheinn.cn) and found loads other links featuring that site but no pages about the problem itself. There's also the risk of restoring from backups only to find that the issue occurred before people noticed and the backups themselves are 'infected'.

The IIS box is a windows 2003 standard machine running MySQL and MS SQL 2005. Until very recently the client was doing plain dumb stuff like setting each site to the use the SA account of MS SQL with a really slack password, so I'm not entirely surprised that someone may have leveraged a way in to IIS and screwed up the links.

Anyone seen this before? I'd like to know more about it before I simply say that we burn the server at sunset, particularly if there is a risk of it coming back (which I'm assuming there is).

Olly

0
Comment
Question by:stonneway
  • 2
  • 2
4 Comments
 
LVL 7

Accepted Solution

by:
alexpercsi earned 1000 total points
ID: 21817808
Most likely this site has fallen victim to an SQL Injection attack. The malicious code probably found its way into the database of the site and is served from there. Look at the database content and see if you can find the script (or part of the script) in the tables. If you can determine the time it was added to the database and have regular backups, consider reverting to a version from before the infestation of the database.

Let me know if this helps. There might be other posibilities as well.

Best Regards,
Alex.

P.S. one basic step in preventing SQL injection attacks is to remove all ' characters from user input.
0
 
LVL 1

Author Comment

by:stonneway
ID: 21820325
Thanks Alex,

I'd come to a similar conclusion last night after finding some references to that domain name on a security site article about SQL injection. As usual, trying to explain to the web company in question that their coder should have parsed the user input hasn't gone down well :)

Thanks
Olly
0
 
LVL 7

Expert Comment

by:alexpercsi
ID: 21823958
Then I assume that proposing to secure the site from cross site scripting attacks is out of the question :)
0
 
LVL 1

Author Comment

by:stonneway
ID: 21829332
Well, it seems that this was the cause;

http://www.modsecurity.org/blog/archives/2008/01/sql_injection_a.html

The coders have accepted that they need to include basic SQL parsing and better security on their back end.

Thanks chaps.

Olly
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Lync server 2013 or Skype for business Backup Service Error ID 4049 – After File Share Migration
Preparing an email is something we should all take special care with – especially when the email is for somebody you may not know very well. The pressures of everyday working life stacked with a hectic office environment can make this a real challen…
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …
As many of you are aware about Scanpst.exe utility which is owned by Microsoft itself to repair inaccessible or damaged PST files, but the question is do you really think Scanpst.exe is capable to repair all sorts of PST related corruption issues?
Suggested Courses

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question