Author Topic: Alerte cheval de troie (OpenX)  (Read 14940 times)

0 Members and 1 Guest are viewing this topic.

jffuchs

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #15 on: December 29, 2013, 10:08:49 PM »
Merci Kubecj,

Je n'ai pas réussi a reproduire l'alerte avec une autre anti-virus (j'ai essayé : http://urlquery.net/report.php?id=8607762 ou https://www.virustotal.com/fr/url/3cc2bb8852928497a3c3165bed56c55aea4bb52754c6b76fcc8453f93568bdfa/analysis/1388266428/)

J'utilise OpenX 2.8.10 et je n'ai trouvé aucun fichier qui avait subit une modification depuis janvier 2013 .....

Pourriez-vous me préciser quelle page est "infectée" ? (je n'ai rien trouvé dans ajs.php)

Un grand merci pour votre aide,

Frederic

kubecj

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #16 on: December 29, 2013, 10:38:52 PM »
It seems nobody else is detecting it right now.
The code is most probably injected in OpenX database.

Look for such code:
Quote
try{$a=~[];$a={___:++$a,$$$$:(![]+\"\")[$a],__$:++$a,$_$_:(![]+\"\")[$a],_$_:++$a,$_$$:({}+\"\")[$a],$$_$:($a[$a]+\"\")[$a


(Il semble qu'aucun autre produit détecte dès maintenant.
Le code est probablement injecté dans la base de données OpenX.

Recherchez ce code:)

kubecj

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #17 on: December 29, 2013, 11:18:39 PM »
Regarding this:
J'utilise OpenX 2.8.10 et je n'ai trouvé aucun fichier qui avait subit une modification depuis janvier 2013 .....

The last version of OpenX is 2.8.11, BUT! then it was renamed to Revive! And its latest version is 3.0.2. There was quite a bug in all versions before that, usable for SQL injection.

(La dernière version de OpenX est 2.8.11, MAIS! puis il a été rebaptisé Revive! Et sa dernière version est 3.0.2. Il était tout à fait d'un bug dans toutes les versions avant que, utilisables pour l'injection de SQL.)

jffuchs

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #18 on: December 29, 2013, 11:28:02 PM »
Thank you for your great help,

Can you please tell me how you find the malicious script that was injected in the database ?

3 lines where infected inside the table AUDIT (details ) et ZONES ("prepend" and "append")

The 3 websites work well .....

I tried to install the new version called Revive 3.0.2 it did not work well .....

Regards,

Frederic

« Last Edit: December 29, 2013, 11:29:48 PM by jffuchs »

kubecj

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #19 on: December 29, 2013, 11:32:32 PM »
Yes, append and prepend are usual places where the malicious code is inserted to. If I'm not mistaken, it seems your site is now clean.

I believe latest Revive fixes the bug:
http://www.revive-adserver.com/blog/revive-adserver-v3-0-2-released-important-security-fix/

Here's also the description of the bug and some fixes/workarounds for older OpenX:
http://www.kreativrauschen.com/blog/2013/12/18/zero-day-vulnerability-in-openx-source-2-8-11-and-revive-adserver-3-0-1/

jffuchs

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #20 on: December 29, 2013, 11:40:09 PM »
I will find a solution for an upgrade as soon as possible  :P

Can you please tell me how you find the malicious script that was injected in the database ? (your answer will help me for the futur)

Regards,

Frederic

kubecj

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #21 on: December 29, 2013, 11:43:42 PM »
I have no idea, I was never on that side of the problem  8)

You can simply look at it in something like mysqladmin (if the SQL DB is mysql)
Or you can make text dump and then try to grep.
Or write some sql command using on append and prepend columns.

jffuchs

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #22 on: December 29, 2013, 11:49:36 PM »
Can you please tell me how you find the malicious script that was injected in the database ? (the "[]+\"\")[$a],__$:++$a,$_$_:(![]+\"\")[$a],_$_:++$a,$_$$" )

Thank you,

kubecj

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #23 on: December 29, 2013, 11:53:09 PM »
It's our know-how as antivirus company to decide if some script is bad or not. We simply found strange redirection by some heuristic in avast, downloaded the samples, checked what they do, and decided to detect it. There is no general answer to such question, I'm afraid.

jffuchs

  • Guest
Re: Fausse alerte cheval de troie (OpenX)
« Reply #24 on: December 29, 2013, 11:57:11 PM »
ok, thank you for you great help ..... !

I renamed the title of the thread "Fause alerte cheval de troie (OpenX)" -> "Alerte cheval de troie (OpenX)" ;-)

Frederic
« Last Edit: December 30, 2013, 12:00:26 AM by jffuchs »

mx_starter

  • Guest
Re: Alerte cheval de troie (OpenX)
« Reply #25 on: January 02, 2014, 03:26:28 PM »
It must be noted, that simply upgrading to revive 3.0.2 is NOT ENOUGH!!!
If your database has been sql-injected, you must clean it also:
1. stop the ad-server
2. remove all the files under /var/cache
3. The affected tables in mysql are named 'audit' and 'zones' (plus prefixes in front if you use them)
4. Open the admin panel and for each of the zones:
4.1. Click on the 'Advanced' tab and remove the malicious script from the prepend/append fields, then save the changes
4.2. For each of the zones, there would be a record in the 'audit' table cotaining the script in the 'details' field. Delete these records and you are fine - Avast should stop complaining anymore.

Offline jefferson sant

  • Starting Graphoman
  • *
  • Posts: 6674
  • volunteer
Re: Fausse alerte cheval de troie (OpenX)
« Reply #26 on: January 07, 2014, 02:23:56 AM »
It's our know-how as antivirus company to decide if some script is bad or not. We simply found strange redirection by some heuristic in avast, downloaded the samples, checked what they do, and decided to detect it. There is no general answer to such question, I'm afraid.

Problem solved
URL was unblocked

Thanks Kubecj.
« Last Edit: July 11, 2014, 04:11:26 AM by jefferson santiag »