Mambo Security Problems

by on March 10, 2006 · 2 comments· LAST UPDATED September 23, 2009

in

Hackers (read as cracker) attacking on unpatched versions of the Mambo content management system that can be used to build botnets for use in phishing scams and distributed denial of service (DDoS) attacks.

They are using PHP-based CMS mass-exploitation and other vulnerabilities in open source CMS applications. If you are in server, collocation businesses then watch out all these attacks.

Update Mambo as soon as possible. More information available at following sites:

TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!

{ 2 comments… read them below or add one }

1 Harka May 30, 2008 at 7:19 am

The issue for webhosters is a bit more complex. Generally the customers install these CMS themselves and if they don’t keep it up-to-date then nobody will. Couple that with the general “My uploaded pictures aren’t showing up…chmod 777 the whole directory tree for me!” attitude and next thing you know, you have phishing sites and DoS perl scripts running.

The issue is multifold:

1. As webhoster how do you even find out what CMS are installed and what version do they run at? Here scripts are badly needed to collect that information.

2. If you do find an insecure installation, you may not even know whom the domain in question belongs to and/or how to contact the owner…a common issue on a server with resellers who create domains on their own. Also, what procedure do you follow, if you do manage to contact the customer, but they don’t respond or don’t know how to do an update?

3. The issue of securely installing and updating CMS systems is inadequately addressed by many a documentation. Most do not take such issues into account, that on servers you generally have one username for FTP but another for the Apache process, which the CMS will then also use for its created files/directories. This results in a ownership/permission conflict, which end-users as well as datacenter admins usually “fix” with liberal 777’s. This point alone is a *major* factor and addressing it properly (without interfering with things like Cpanel, Plesk etc) could drastically reduce insecure installations of CMS systems.

Would love to know how other admins deal with these issues (the above was just off-the-top of my head)!

Reply

2 Elpie September 23, 2009 at 5:58 am

Please update the link for Mambo. Mambo moved from mamboserver.com to its official home on mambo-foundation.org in 2006. Updating your link will ensure people don’t go from this article to a dead site that is not related to the Mambo open source CMS project.
Thanks!

Reply

Leave a Comment

Tagged as: , , , , , , , , , , ,

Previous post:

Next post: