[CentOS] decode http hack attempt?

Thu Sep 24 14:02:45 UTC 2015
Eero Volotinen <eero.volotinen at iki.fi>

See:
http://code.taobao.org/p/tpbase/diff/2/trunk/ThinkPHP/Library/Think/App.class.php

if(!$module) {

+            if('4e5e5d7364f443e28fbf0d3ae744a59a' == CONTROLLER_NAME) {

+                header("Content-type:image/png");

+                exit(base64_decode(App::logo()));

+            }


I think it's way to detect if system is running vulnerable version of
ThinkPHP?


--

Eero

2015-09-24 16:53 GMT+03:00 Tony Mountifield <tony at softins.co.uk>:

> In article <
> e4bd3a73fc95477064436043eb8a37ed.squirrel at webmail.harte-lyne.ca>,
> James B. Byrne <byrnejb at harte-lyne.ca> wrote:
> > Can anyone de-cypher the second entry for me?
> >
> > --------------------- httpd Begin ------------------------
> >
> >
> >  Requests with error response codes
> >     403 Forbidden
> >        /: 9 Time(s)
> >        /?c=4e5e5d7364f443e28fbf0d3ae744a59a: 3 Time(s)
> >
> > I have found the string via Google but have not located any explanation.
>
> It appears to be something to do with a PHP framework called ThinkPHP.
> One of the hits when searching for it is for ThinkPHP on Google Code.
>
> Perhaps there is a vulnerability in ThinkPHP, and this access is from
> a machine scanning for vulnerable sites? Just a guess.
>
> I don't think it has a meaning - it's just a 128-bit number expressed in
> hex.
>
> Cheers
> Tony
>
> --
> Tony Mountifield
> Work: tony at softins.co.uk - http://www.softins.co.uk
> Play: tony at mountifield.org - http://tony.mountifield.org
> _______________________________________________
> CentOS mailing list
> CentOS at centos.org
> https://lists.centos.org/mailman/listinfo/centos
>