What index.php are you using? Is this WordPress?
http://archive.cert.uni-stuttgart.de/bugtraq/2007/03/msg00030.html
There are many php exploits: http://archive.cert.uni-stuttgart.de/bugtraq/2007/03/msg00031.html
www.Obnosis.com | http://en.wiktionary.org/wiki/Citations:obnosis |
http://www.urbandictionary.com/define.php?term=obnosis (503)754-4452
Catch the January PLUG HackFest! Kristy Westphal, CSO for the Arizona Department of Economic
Security will provide a one hour
presentation on forensics.
Date: Wed, 3 Dec 2008 14:57:35 -0800
From: klsmith2020@yahoo.com
Subject: Re: OT: Website Exploits
To: plug-discuss@lists.plug.phoenix.az.us
Thank you for the heads up on mod_security. I'm not sure if that is installed or not.
Thanks again!
------------------------ Keith Smith
--- On Wed, 12/3/08, JD Austin <jd@twingeckos.com> wrote:
From: JD Austin <jd@twingeckos.com> Subject: Re: OT: Website Exploits To: klsmith2020@yahoo.com, "Main PLUG discussion
list" <plug-discuss@lists.plug.phoenix.az.us> Date: Wednesday, December 3, 2008, 3:48 PM
That is a fairly common tactic. It exploits poor input validation and register globals in PHP. Do yourself a huge favor and install mod_security (I assume you're using apache?) as an extra measure of
security if you haven't already.
--------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change your mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss |
Send e-mail anywhere. No map, no compass.
Get your HotmailŪ account now.