Declaro
asked on
Malicious Code Being Uploaded to Windows 2003 WebServer (with classic asp and php scripts enabled)
We have a number of shared 2003 web servers provided through Fasthosts. A number of these have been found to have unauthorised files on them (i.e. files that we've not uploaded). Most of these appear to be simple classic ASP files that display the current date and time. However on a couple of sites there's been either a classic ASP or PHP file that creates thousands of files and folders which contain "link farms" to various fake goods websites.
We've removed the malicious content in question and reset FTP passwords on the affected domains, we've asked for assistance from FH who at present have only advised that the files in question have been uploaded, but not uploaded using FTP. They've suggested the files have been added by exploiting either Javascript or an upload script on the server, and have suggested that we update any CMS systems we may have to remove possible vulnerabilities.
Strange thing is a couple of the sites in question don't have any files on them at all and are only used for email hosting. I've explained this to them and they've said they will investigate further.
I'm confused by their comments to be honest and i think I know the answer to this but, My question is do any of you out there know if it's possible to post content to a server that would end up in a classic ASP / PHP files (with server executable code embedded) being saved to the server without having FTP access?
We have an obvious security concern, in most cases we are the only people with FTP access to the servers in question. Like i said we've changed the passwords and so far no further code since it's discovery (two days ago) has been found. Our machines have been checked for virus's and malware and they've come back clear, so it's difficult to know where to begin in trying to prevent this from happening again.
If anyone can provide any advice it will be greatly recieved, Thanks.
We've removed the malicious content in question and reset FTP passwords on the affected domains, we've asked for assistance from FH who at present have only advised that the files in question have been uploaded, but not uploaded using FTP. They've suggested the files have been added by exploiting either Javascript or an upload script on the server, and have suggested that we update any CMS systems we may have to remove possible vulnerabilities.
Strange thing is a couple of the sites in question don't have any files on them at all and are only used for email hosting. I've explained this to them and they've said they will investigate further.
I'm confused by their comments to be honest and i think I know the answer to this but, My question is do any of you out there know if it's possible to post content to a server that would end up in a classic ASP / PHP files (with server executable code embedded) being saved to the server without having FTP access?
We have an obvious security concern, in most cases we are the only people with FTP access to the servers in question. Like i said we've changed the passwords and so far no further code since it's discovery (two days ago) has been found. Our machines have been checked for virus's and malware and they've come back clear, so it's difficult to know where to begin in trying to prevent this from happening again.
If anyone can provide any advice it will be greatly recieved, Thanks.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Actually, you are mistaken. Windows 2003 will receive security updates until July 2015. However, you as a user, cannot tell if the admin has put updates on manual install, and maybe forgot a few months. In that case, there could have been some OS vulnerabilities (probably not out right remote, most of them user-initiated (in this case, admin initiated)).
ASKER
Hi thanks for the quick response you're right I've spoken to our IT dept here who have also confirmed this fact. Strange that FH have said this and are pushing so much to upgrade??
I'll wait to see what comes back from there investigation. Thanks for the response.
I'll wait to see what comes back from there investigation. Thanks for the response.
Since they're the full admin of the servers, I would expect them to help you migrate (hell, if properly done, it will take no downtime, and you won't even notice it was changed).
Even if they don't help you with the migration, they could've at least provided you access to the new host with a temporary hostname for you to start migrating and testing.
Even if they don't help you with the migration, they could've at least provided you access to the new host with a temporary hostname for you to start migrating and testing.
ASKER
Have there been any reported OS vulnerabilities since support has stopped?