Skip the navigation

Impact of worm targeting Mambo CMS low, say researchers

Mare.D targets Mambo CMS and PHP XML-RPC

By Jeremy Kirk
February 21, 2006 12:00 PM ET

IDG News Service - F-Secure Corp. is warning of a network worm that targets vulnerabilities in the Mambo Content Management System (CMS) and PHP XML-RPC, a library of code for PHP programmers that allows procedures to run between computers with different operating systems.
F-Secure calls the worm Mare.D, saying it installs several backdoors on a compromised system. The worm scans random hosts for those running vulnerable installations of the Mambo open source Web site content management system or the PHP XML-RPC library.
Two of the backdoors -- "cb" and "ping.txt" -- are connectback shell backdoors that connected to a remote host via port 8080, F-Secure said. The third is controlled by IRC (Internet Relay Chat) and written in the Perl language. The main component of the worm listens on UDP (User Datagram Protocol) port 27015 for commands, F-Secure said.
Secunia, which also issued an advisory, said the vulnerability affects Version 1.1 of PHP XML-RPC and prior versions. Its advisory recommended upgrading PHP XML-RPC to Version 1.1.1.
Mambo wrote on its Web site that it has issued fixes for versions 4.5.3 and 4.5.3h. Those fixes can be downloaded from Mambo's Web site. It also recommended that users upgrade their software if they have a version earlier than 4.5.3.
So far, it doesn't appear many users have been affected. Graham Cluley, a senior technology consultant with Sophos PLC, said the company has not heard concerns from its customers over the worm.

Reprinted with permission from IDG.net. Story copyright 2014 International Data Group. All rights reserved.
Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!