Jump to content

PHP xmlrpc.php error


mlordi

Recommended Posts

Does anyone know of a way to block a user from scanning for this file exploit. I do not have the file xmlrpc.php installed anywhere on my web server, but for some reason somebody keeps running a scan for it. Whenever the scan is invoked it seems to crash our www publishing service in iis 5. Does anyone know where I can check or how to block this kind of attack?

Link to comment
Share on other sites

  • 4 weeks later...

[!--quoteo(post=328795:date=Dec 19 2005, 08:12 PM:name=Mark Lordi)--][div class=\'quotetop\']QUOTE(Mark Lordi @ Dec 19 2005, 08:12 PM) 328795[/snapback][/div][div class=\'quotemain\'][!--quotec--]

Does anyone know of a way to block a user from scanning for this file exploit. I do not have the file xmlrpc.php installed anywhere on my web server, but for some reason somebody keeps running a scan for it. Whenever the scan is invoked it seems to crash our www publishing service in iis 5. Does anyone know where I can check or how to block this kind of attack?

 

I would redirect him somewhere ;)

 

Make a php file called xmlrpc.php

<?php

header("Location: [a href=\"http://www.nastysite.com/");\" target=\"_blank\"]http://www.nastysite.com/");[/a]

?>

 

If you want to get clever you could filter the file in the iislockdown tool:

[a href=\"http://www.microsoft.com/technet/security/tools/locktool.mspx\" target=\"_blank\"]http://www.microsoft.com/technet/security/...s/locktool.mspx[/a]

 

You may want to install the urlscan package which has the iislockdowntool included:

[a href=\"http://www.microsoft.com/technet/security/tools/urlscan.mspx?#g\" target=\"_blank\"]http://www.microsoft.com/technet/security/...urlscan.mspx?#g[/a]

 

You will need to add xmlrpc.php to the [DenyUrlSequences] section in the urlscan.ini file which will be in the \System32\Inetsrv\URLscan folder

 

you can also specify where you send him by including a RejectResponseUrl in the ini file

 

HTH

Clint Gaskin

Link to comment
Share on other sites

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.