Is that possible with an up to date .htaccess?

On Jan 27, 2010, at 1:57 PM, Jeff Greenberg wrote:

On 1/27/2010 12:43 PM, Matt Chapman wrote:
Also FTR, I've seen a similar (but not quite identical) sort of attack
on a xcart installation on another host.

I've seen the osc / xcart attack. They created a subdirectory in the image directory... /yahoo ... and put an index.php file in it. The file checked the query string for a value. If it wasn't there, it would simply display an osc heading. If the value was there, it grabbed a base64 value from the query string, decoded it, and called eval against it.

Reply via email to