Security News > 2021 > March > Serious Security: Webshells explained in the aftermath of HAFNIUM attacks

Serious Security: Webshells explained in the aftermath of HAFNIUM attacks
2021-03-09 19:32

Note, of course, that the crooks don't have to be able to run uploaded files right away in order to do serious damage.

In the recent Hafnium attacks, you've probably seen numerous mentions of the attackers using things known as webshells as a trick to launch files that they just infiltrated.

These are known in the jargon as static pages, for obvious reasons: the file stored on the server is the content that gets served every time.

Html file could cause real trouble for your server by causing you to serve up fake news, malware content, or bogus links, so a web server bug that allows arbitrary file writes always spells trouble.

What you're looking at here is a really easy way for crooks who can write files to a web server, but not run them directly, to launch them indirectly instead. If you can infiltrate a file with a scriptable extension into the right place on a web server, then you can visit later just using your browser and force the file to execute on the server, simply by referencing the URL that corresponds to the infiltrated file.

Active Server Pages are safe enough if you only ever allow the server to access trusted script files designed to create legitimate content for the pages you're intending to serve up.


News URL

https://nakedsecurity.sophos.com/2021/03/09/serious-security-webshells-explained-in-the-aftermath-of-hafnium-attacks/