News Feed
Sections




News Archive
feed this:

Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Stefan Esser's Blog:
Some facts about the PHPList vulnerability and the phpbb.com hack
February 06, 2009 @ 08:44:25

Some of you might have heard about the hacking of the phpBB.com website earlier this week. Well, Stefan Esser has posted a bit more about the vulnerability in the PHPList software that lead to the problem.

A few days ago phpbb.com was hacked through a super-globals-overwrite vulnerability in PHPList that was used by an attacker for a local file inclusion exploit. Details about the whole attack, written down by someone who claims to be the attacker, can be read here.

Stefan talks about the superglobal problem PHPList had - allowing the superglobal information to overwrite the variables inside the script without so much as a check. Example code shows how it was possible for the attacker to provide their own configuration file value to be opened via a stream wrapper.

0 comments voice your opinion now!
vulnerability phplist phpbbcom hack exploit superglobal overwrite


ReadyToBeServed.com:
Web Host May Ask Client To Cover Cost Of Hack
August 14, 2006 @ 08:03:39

According to this new article on ReadyToBeServed.com, a flaw in the PHPNuke software allowed a malicious user access to a server to cause all sorts of headaches for both the hosting company and the others hosted on that machine.

A Wellington, New Zealand, Web hosting company may seek compensation from a client that it claims is responsible for the worst hacking attack in the company's history. IServe blames lax security on their client's part for the hacking job that resulted in the defacing of hundreds of Websites.

The hack forced iServe to shut down all its FTP servers for 28 hours, while it replaced many of its customers' websites with back-ups that were made a few days before the incident.

Joy Cottle, iServe's general manager estimates the problem cost about $20,000 to repair. Clients with dedicated servers were not affected by the hack.

They report that the attack happened because of a flaw in the content management system that allowed the user to overwrite websites of other customers on the machine. They are even considering trying to recoup some of the costs from the customer that allowed it to happen. The hole was one found in the older version of PHPNuke the customer had uploaded.

Due to the incident, iServe is now considering banning cleints from running PHPNuke
0 comments voice your opinion now!
hack phpnuke security hole overwrite ban hack phpnuke security hole overwrite ban



Community Events





Don't see your event here?
Let us know!


version introduction tool conference security series library symfony artisanfiles community composer list framework podcast voicesoftheelephpant opinion laravel release language interview

All content copyright, 2014 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework