Link to home
Start Free TrialLog in
Avatar of Declaro
Declaro

asked on

Malicious Code Being Uploaded to Windows 2003 WebServer (with classic asp and php scripts enabled)

We have a number of shared 2003 web servers provided through Fasthosts. A number of these have been found to have unauthorised files on them (i.e. files that we've not uploaded). Most of these appear to be simple classic ASP files that display the current date and time. However on a couple of sites there's been either a classic ASP or PHP file that creates thousands of files and folders which contain "link farms" to various fake goods websites.

We've removed the malicious content in question and reset FTP passwords on the affected domains, we've asked for assistance from FH who at present have only advised that the files in question have been uploaded, but not uploaded using FTP. They've suggested the files have been added by exploiting either Javascript or an upload script on the server, and have suggested that we update any CMS systems we may have to remove possible vulnerabilities.

Strange thing is a couple of the sites in question don't have any files on them at all and are only used for email hosting. I've explained this to them and they've said they will investigate further.

I'm confused by their comments to be honest and i think I know the answer to this but, My question is do any of you out there know if it's possible to post content to a server that would end up in a classic ASP / PHP files (with server executable code embedded) being saved to the server without having FTP access?

We have an obvious security concern, in most cases we are the only people with FTP access to the servers in question. Like i said we've changed the passwords and so far no further code since it's discovery (two days ago) has been found. Our machines have been checked for virus's and malware and they've come back clear, so it's difficult to know where to begin in trying to prevent this from happening again.

If anyone can provide any advice it will be greatly recieved, Thanks.
ASKER CERTIFIED SOLUTION
Avatar of Kimputer
Kimputer

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Declaro
Declaro

ASKER

Hi thanks for your response, your comments make sense and it would suggest the server(s) have been compromised. They are pushing for all the sites in question to be upgraded to 2008 server as the 2003 platform is no longer supported by Windows. They've refused to investigate sites that have any files on them (as they don't provide code support). 1 domain affected had no files uploaded to it, so they are going to look there first.

Have there been any reported OS vulnerabilities since support has stopped?
Actually, you are mistaken. Windows 2003 will receive security updates until July 2015. However, you as a user, cannot tell if the admin has put updates on manual install, and maybe forgot a few months. In that case, there could have been some OS vulnerabilities (probably not out right remote, most of them user-initiated (in this case, admin initiated)).
Avatar of Declaro

ASKER

Hi thanks for the quick response you're right I've spoken to our IT dept here who have also confirmed this fact. Strange that FH have said this and are pushing so much to upgrade??

I'll wait to see what comes back from there investigation. Thanks for the response.
Since they're the full admin of the servers, I would expect them to help you migrate (hell, if properly done, it will take no downtime, and you won't even notice it was changed).
Even if they don't help you with the migration, they could've at least provided you access to the new host with a temporary hostname for you to start migrating and testing.