Joomla websites using the Googlemaps plugin for Joomla are actively abused as open proxy for launching Denial-of-Service (DoS) attacks. Even though the Googlemaps plugin vulnerability
plugin_googlemap2_proxy.php was released over one and a half (1,5) years ago, I still see these DoS-attacks happening on a regular basis…
This isn’t the first vulnerability in a Joomla! plugin or component (and won’t be the last…): we all remember the Joomla Content Editor (JCE) and Media Manager vulnerabilities and exploits. It seems Joomla! website owners tend to not update their sites, which is very bad of course.
The problem with the Joomla! Googlemaps plugin lies in the fact anyone can request the
/plugins/system/plugin_googlemap2_proxy.php in their browser or script, to execute cURL HTTP requests to remote websites. The
url parameter is vulnerable for Cross Site Scripting (XSS) attacks, and allows the retrieval of remote website content. When this happens a lot, a website becomes overloaded and unresponsive, making a Denial-of-Service attack successfully executed.
This is not only a problem for the website owner on the remote end, or its hosting company. Your web servers transmit a lot of HTTP traffic to remote ends, increasing server load, usage and network bandwidth (for which you pay). Therefor it’s important to stop this abuse.
An example request I pulled from a website logfile:
2014-11-16 08:54:25 188.8.131.52 GET /plugins/system/plugin_googlemap2_proxy.php url=www.victim_site.example 80 - 184.108.40.206 Mozilla/5.0+(Windows+NT+6.1;+WOW64)+AppleWebKit/537.36+ (KHTML,+like+Gecko)+Chrome/37.0.2062.124+Safari/537.36 - example.com 200 0 64 0 252 42558
A quick search on one web server for the file plugin_googlemap2_proxy.php showed me it’s used a lot. Those Joomla! sites are running older 1.5.x versions too *sigh*… So, let’s stop these DoS attacks on remote sites.
A mitigation is to implement a Project Honeypot solution to filter and block IP addresses on the HTTP level. They call their HTTP blacklist Http:BL. Join and work with Project Honeypot to add IP addresses of abusers to their database, create new, or improve existing implementations for Http:BL, or donate a small amount of money to the cause. Of course you can create your own HTTP blacklist easily as well.
The simplest way to stop being a proxy for DoS attacks is to just remove the
plugin_googlemap2_proxy.php file. This file is often located in the folder
Block the access to plugin_googlemap2_proxy.php with an .htaccess RewriteRule:
Open up Joomla’s default
.htaccess file and locate the line
Directly below that line, add:
RewriteRule plugin_googlemap2_proxy.php - [F,L]
This will deny any request to the URI
plugin_googlemap2_proxy.php with a 403 Forbidden status code. (Updated the RewriteRule to reflect Paul’s comment)
The same as the .htaccess block can be made with IIS URL Rewrite feature in the
web.config file. Use the following Rewrite rule:
<rule name="block Joomla Googlemap plugin" stopProcessing="true"> <match url=".plugin_googlemap2_proxy\.php" ignoreCase="false" /> <action type="CustomResponse" statusCode="403" statusReason="Forbidden: Access is denied." statusDescription="No DDoSing remote websites!" /> </rule>
This will display an HTTP 403.0 – Forbidden status code with a message “No DDoSing remote websites!”.
You can block requests to the plugin_googlemap2_proxy.php file with IIS’ Request Filtering too. Either in IIS’ root node, or on the website level. In the next example, fill out a website name after
config to add this Request Filtering denyUrlSequences rule to a particular website, and use
IIS root node:
AppCmd set config -section:system.webserver/security/requestFiltering /+"denyUrlSequences.[sequence='plugin_googlemap2_proxy.php']" /commit:apphost
AppCmd set config "Default Web Site" -section:system.webserver/security/requestFiltering /+"denyUrlSequences.[sequence='plugin_googlemap2_proxy.php']" /commit:webroot
This will display a HTTP Error 404.5 – Not Found response.
And last but not least…: Update Joomla!, and update all plugins and components! Remove unused plugins and components. The websites I inspected running this file, all still run ancient 1.5.x versions of Joomla!. Joomla 1.5.x is ancient, unsafe, vulnerable, and should be banned from the internet IMO.
The following 25(!) IP addresses are responsible for millions of hits to this plugin_googlemap2_proxy.php file a day:
220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11 18.104.22.168 22.214.171.124 126.96.36.199 188.8.131.52 184.108.40.206 220.127.116.11
Unfortunately not all IP addresses are listed at services like Project Honey Pot, but I suggest you block them on your network.
My name is Jan. I am not a hacker, coder, developer, programmer or guru. I am merely a system administrator, doing my daily thing at Vevida in the Netherlands. With over 10 years of experience, my specialties include Windows Server, IIS, Linux (CentOS, Debian), security, PHP, websites & optimization.
Has this post saved you time, helped you solve a problem? Or do you think Saotn is just awesome? Then why not support us and make a small, one-time, donation?
A small donation supports us in research time, hosting costs, and growth.
Please buy me a cup of coffee ($2.5) to support these articles and posts.
Or use this link to enter your own donation amount. Thank you!
SSDP amplified reflective DDoS attacks
WordPress 3.9.2 Security Release fixes XML-RPC DoS
Mod_evasive on IIS
Huge increase in WordPress xmlrpc.php POST requests
Good Web Security News: Open DNS Resolvers Are Getting Closed
WordPress Pingback Vulnerability