phuip-fpizdam
phuip-fpizdam copied to clipboard
Question only: docker-splitted enviroments attackable?
Just a technical question, our servers are updated :) We use a splitted enviroment where nginx runs in one container, php-fpm in another. I tried to reproduce the issue with your exploit, but it seems to hang at
2019/11/05 21:30:58 The target is probably vulnerable. Possible QSLs: [1735 1740 1745]
while the project runs localy (8mins now). As i inspect your docker-file, you seem to have your enviroment combined in the same container. If the split we did protected us from the attack anyway, this would be a nice side-info :)
Also, if this is really the case, it would be may a idea to add it to the requirements?
Thanks for developing this poc!
No, splitting nginx and php-fpm in different containers doesn't protect you in any way.
It is strange that QSLs are found even though you have updated your servers. I suggest you to double check that.
It is strange that QSLs are found even though you have updated your servers. I suggest you to double check that.
i am sorry as i was unclear. i retest the attack by downgrading the docker-images to our previous versions and run them only local. as i tested it on our productive servers, it was not able to do any part of the attack.
No, splitting nginx and php-fpm in different containers doesn't protect you in any way.
ok, interessting then, it still hangs there. i guess your exploit would be able to handle that "remote-connection" (to the other container).