kisuka
New Member
An explanation of the exploit / hack for people who aren't in the web development or tech industry:
On the FA server is a program called ImageMagick installed. ImageMagick is used to resize images, manipulate them, etc. Tons of web services use ImageMagick for image processing. It is a very common piece of software.
On 2016/03/30 a critical security report was posted regarding ImageMagick (www.cve.mitre.org: CVE - CVE-2016-3714
Okay so. When using a website, when you have an upload form (images, files, attachments, etc) you can technically upload anything you want. When you upload a file, typically a website will check the file on the backend, to make sure it's what you want (an image, a pdf, etc) and only allow that. When you don't restrict other file types, people can upload files to the server that they can then access from the website's url (typically where uploads / images are hosted at). These malicious files are called 'web shells' which can be logged into by a third party and be used to control the server the website is on.
The exploit that was used allowed the attacker to get ImageMagick to execute commands on the server, which allowed them to most likely pop a shell and gain access to the server.
Once you are in the server, you can view config files to get access to the database.
Hope this explains things.
On the FA server is a program called ImageMagick installed. ImageMagick is used to resize images, manipulate them, etc. Tons of web services use ImageMagick for image processing. It is a very common piece of software.
On 2016/03/30 a critical security report was posted regarding ImageMagick (www.cve.mitre.org: CVE - CVE-2016-3714
Okay so. When using a website, when you have an upload form (images, files, attachments, etc) you can technically upload anything you want. When you upload a file, typically a website will check the file on the backend, to make sure it's what you want (an image, a pdf, etc) and only allow that. When you don't restrict other file types, people can upload files to the server that they can then access from the website's url (typically where uploads / images are hosted at). These malicious files are called 'web shells' which can be logged into by a third party and be used to control the server the website is on.
The exploit that was used allowed the attacker to get ImageMagick to execute commands on the server, which allowed them to most likely pop a shell and gain access to the server.
Once you are in the server, you can view config files to get access to the database.
Hope this explains things.