Entry tags:
Hostees!
Hostees of mine on magatsu.net -- my webspace was hit with an exploit that I'm cleaning out now. I think it was just my accounts and not any of you (as I cannot access your accounts) but please do (a) change your passwords and (b) check your webspace using FileZilla or another FTP program for a PHP script that shouldn't be there. (details under cut)
Details:
The exploit seems to be consistently 28,278 bytes in size, a PHP file named with either two people's named connected by an underscore or an English word connected to a person's name with an underscore. I've found it in root files, and in an images folder in a wiki site and in an uploads folder in a Wordpress site, and in a trunk folder and images folder for survey software I was testing.
If you know how to grep, you can grep for _8b7b as it appears to consistently use that as a variable.
No clue what it's for as it's encrypted. Change your WebID password and your FTP user password to be on the safe side.
Details:
The exploit seems to be consistently 28,278 bytes in size, a PHP file named with either two people's named connected by an underscore or an English word connected to a person's name with an underscore. I've found it in root files, and in an images folder in a wiki site and in an uploads folder in a Wordpress site, and in a trunk folder and images folder for survey software I was testing.
If you know how to grep, you can grep for _8b7b as it appears to consistently use that as a variable.
No clue what it's for as it's encrypted. Change your WebID password and your FTP user password to be on the safe side.
no subject
no subject
no subject
no subject
no subject
I really need to organise the space better though. I suck at filing, even when it's digital storage!
no subject
no subject
Obviously I've been logging in regularly to notice this right now. >_> <_<
no subject
no subject