Could this hack be applied (or modified) to XOOPS v2.2.4?
Thanks,
C
XOOPS 2.0.16 PHP 5.2.2, MySQL 5.0.24a-standard-log, Apache/2.0.54 (Unix)
XOOPS 2.2.4, PHP 4.3.10, MySQL 3.23.58, Apache/1.3.33 (Unix)[/size]
RewriteCond %{QUERY_STRING} https?:
RewriteRule .* - [F]
blueteen wrote:
Often, a picture called like this (remote url), is a malicious code in reality. (on windows system, try to download this picture, then edit with a text editor).
This is a way to deface or hack your website/server.
It's a good thing to contact the provider's abuse service, providing the link to the picture, some logs samples and few words.
Bandit-X wrote:
anyone notice an increase of suspicious entries in the error log?
i have been getting a lot of entries that look suspicious.. well not only look but are...
Marco wrote:
those sort of issues have already been reported to core. The team is aware of that, dugris has incorporated those in a dedicated branch (see revision 997http://xoops.svn.sourceforge.net/viewvc/xoops/?pathrev=997). Herve's 2.0.17 has fixed all of the strongest holes. The core team decided not to add those in the official 2.0.17 (http://sourceforge.net/forum/message.php?msg_id=4471768)
bad.
marco
McDonald wrote:
What versions (Xoops and Newbb) are you both using?
And, do you have the module Protector installed?