Star2Billing / a2billing

A2Billing is a telecom switch and billing system capable of providing and billing a range of telecom products and services to customers such as calling card products, residential and wholesale VoIP termination, DID resale and callback services.
www.asterisk2billing.org
Other
181 stars 175 forks source link

Web bots are after /a2billing/common/javascript/misc.js #149

Closed Marcool04 closed 6 years ago

Marcool04 commented 7 years ago

Hello, First off, I know this is not an issue with a2billing. I just thought I would let you know that a rather large number of web bots have been crawling my servers lately, looking to GET this particular file in your web app : /a2billing/common/javascript/misc.js. To show the extent of this, here is an abuseipdb report for just one of multiple IPs performing these scans. From what I can tell (but I am no javascript security expert), there is no particular security implication from the window.open() call in the lone function that this file holds. Nevertheless, I thought I would mention this activity to you, the developer(s)/maintainer(s) of this product, as this is indeed not an issue for me, but could well be for any people using your product in a live environment, if those behind the web bots have found a way to exploit this file (I don't know that this is the case, but I simply cannot imagine why else anybody would be crawling after that specific piece of javascript). So there it is. Just a heads up. All the best, Mark.

areski commented 7 years ago

Thanks for letting us know

Marcool04 commented 7 years ago

You're quite welcome!

joaner commented 7 years ago

Perhaps just sniffing whether the site has installed a2billing service, and your php code may have a security hole.

Marcool04 commented 7 years ago

Yes makes sense that they could well be sniffing that file because it's small, quick to download, but actually are after a vulnerability elsewhere in the code. The bots seem to be performing requests by IP as that's the error that's getting thrown by mod_security and got my attention in the logs, which suggests a large-scale scan, and would certainly argue, on the part of the bot, for a GET against a small file.

ghost commented 7 years ago

Sorry for necroing this thread however my personal development server has been pretty much attacked by several bots looking for this exact file on my server. Around roughly 184 requests for a file that always 404s, is there any reason why they would or is it just bad bot design?

Some statistics, all of the requests are from Cloud Computing providers I have had no knowledge of previously.

Files Requested by volume:
    88 Requests: /a2billing/common/javascript/misc.js
        Breakdown via Useragent:
            68 via PythonRequests/python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-514.16.1.el7.x86_64
            19 via PythonRequests/python-requests/2.13.0
            1  via PythonRequests/python-requests/2.6.0 CPython/2.7.5 Linux/3.10.0-327.10.1.el7.x86_64

    8 Requests: //a2billing/common/javascript/misc.js
        Breakdown via Useragent:
            8 via PythonRequests/python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.1.1.el6.x86_64
areski commented 7 years ago

They are probably looking for installed version of A2Billing, some of the old ones have important security issues.

Jannes123 commented 6 years ago

Still happening 46.xxx.xxx.xxx - - [08/Mar/2018:09:07:52 +0200] "GET /a2billing/common/javascript/misc.js HTTP/1.1" 400 1901 "-" "python-requests/2.18.4"

Marcool04 commented 6 years ago

Not much to be done really, as the file isn't there, and anybody running a2billing should have updated from the vulnerable versions, this is not actually a security risk. I suppose at least now this thread is here to reassure anyone who needs to be…