- Affected App
- WoltLab Suite Core
Hi,
I recently got reports from Microsoft that my server was sending spam mails.
It turns out Woltlab (wcf) is sending these spam mails!
Hereby an excerpt from the website mail logs:
[24-Jun-2016 07:13:45 Europe/Amsterdam] mail() on [/home/username/domains/domain.com/public_html/wcf/lib/system/mail/PHPMailSender.class.php:19]: To: Labrieaq8n <dgsdzaaxdxsxccss@apocztaz.com.pl> -- Headers: X-Priority: 3 X-Mailer: WoltLab Community Framework Mail Package From: WebsiteName <webmaster@domain.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 MIME-Version: 1.0
[24-Jun-2016 08:39:11 Europe/Amsterdam] mail() on [/home/username/domains/domain.com/public_html/wcf/lib/system/mail/PHPMailSender.class.php:19]: To: frye3376 <all@azuma81106.ammuca.eu> -- Headers: X-Priority: 3 X-Mailer: WoltLab Community Framework Mail Package From: WebsiteName <webmaster@domain.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 MIME-Version: 1.0
[24-Jun-2016 09:46:01 Europe/Amsterdam] mail() on [/home/username/domains/domain.com/public_html/wcf/lib/system/mail/PHPMailSender.class.php:19]: To: Viviengmt <qrhneduj@gmail4u.eu> -- Headers: X-Priority: 3 X-Mailer: WoltLab Community Framework Mail Package From: WebsiteName <webmaster@domain.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 MIME-Version: 1.0
[24-Jun-2016 10:17:35 Europe/Amsterdam] mail() on [/home/username/domains/domain.com/public_html/wcf/lib/system/mail/PHPMailSender.class.php:19]: To: Donaldmqjx <bettyann@randox.securemail.co.pl> -- Headers: X-Priority: 3 X-Mailer: WoltLab Community Framework Mail Package From: WebsiteName <webmaster@domain.com> Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 MIME-Version: 1.0
I also found some files created in /tmp by the woltlab user!
Eg:
/tmp/phpSexPxI /tmp/phpmhWxZ8 /tmp/phpWggxkh /tmp/phpLgF77K /tmp/phpsjg6Jv /tmp/phpTxQNvJ /tmp/phpFf8MW6 /tmp/phpHXIEck
All these files where base64 encoded php scripts.
Eg: a file uploader.
No other intrusions have been found, nor any rootkits.
No weird server logins have been done.
The hack looks like it came via woltlab.
Now, in order to make woltlab a nice and secure environment, I think it would be good if I could work together with the Woltlab team to find out which script or package is unsecure.
This allows Woltlab to remove this package from the store or to fix the issue.
Questions:
1) What is the best way to find out which script is sending these mails? Do I need to add some logging somewhere?
2) Is there still a way to save my current Woltlab installation and make it secure again?
Many thanks!