Closed bond-alexander closed 9 years ago
Generally you want to separate the bash from the parameters. Quick and dirty would be a regex for an URL/IP:Port in the parameters. If you get the full bash command, you can also execute it in kippo.
Assuming this to be answered, closing the issue.
Over the past few days, my Glastopf instance has been seeing more command injection attempts designed to download and execute a file. However, Glastopf itself doesn't recognize the attack and doesn't try to download the payload.
Example POST:
Which decodes to:
I see the same POST appear repeatedly, with different remote IPs (same port) and different filenames.
What can we do to get Glastopf to safely execute the code and retrieve the file?