phuip-fpizdam icon indicating copy to clipboard operation
phuip-fpizdam copied to clipboard

Question only: docker-splitted enviroments attackable?

Open hersche opened this issue 5 years ago • 2 comments

Just a technical question, our servers are updated :) We use a splitted enviroment where nginx runs in one container, php-fpm in another. I tried to reproduce the issue with your exploit, but it seems to hang at

2019/11/05 21:30:58 The target is probably vulnerable. Possible QSLs: [1735 1740 1745]

while the project runs localy (8mins now). As i inspect your docker-file, you seem to have your enviroment combined in the same container. If the split we did protected us from the attack anyway, this would be a nice side-info :)

Also, if this is really the case, it would be may a idea to add it to the requirements?

Thanks for developing this poc!

hersche avatar Nov 05 '19 20:11 hersche

No, splitting nginx and php-fpm in different containers doesn't protect you in any way.

It is strange that QSLs are found even though you have updated your servers. I suggest you to double check that.

neex avatar Nov 05 '19 20:11 neex

It is strange that QSLs are found even though you have updated your servers. I suggest you to double check that.

i am sorry as i was unclear. i retest the attack by downgrading the docker-images to our previous versions and run them only local. as i tested it on our productive servers, it was not able to do any part of the attack.

No, splitting nginx and php-fpm in different containers doesn't protect you in any way.

ok, interessting then, it still hangs there. i guess your exploit would be able to handle that "remote-connection" (to the other container).

hersche avatar Nov 05 '19 20:11 hersche