Hi Warwick,

I'm way out of touch with osCommerce - was surprised to see it still
mentioned. I've not touched it for about 10 years.

Anyway, I wondered if the data being incorrect was the result of a SQL
injection attack - these can allow attackers to arbitrarily alter any
data they wish. Google turned up the bestblooms website in this
pastebin list http://pastebin.com/JCvkuuy7 referencing
http://www.bestblooms.co.nz/shop/images/killer.php - I'm not sure what
this is but Googling suggests it might be something to stop the Google
Spider from getting stuck in your website.

I find it very curious that the pastebin mentioned lists a heap of
those killer.php's - it suggests to me that it may be an unintended
vector for an attack. It would be interesting to look in your apache
access logs (if they go back far enough) and look for odd URL's
(especially those that mention "UNION"). See
http://www.ecommy.com/web-security/oscommerce-sql-injection for a
little more info on SQL injection with an osCommerce flavour.

Unfortunately this doesn't help recover your data, but it might help
point to a possible problem that needs to be fixed.

Cheers,

- Bob -

On 19 December 2011 09:20, Warwick <[email protected]> wrote:
> Hi David
>
> Thanks, yes it's curious alright, because the purchasing public
> actually does get the correct set of emails sent to them, so it's
> correct somewhere in amongst it all; perhaps just when making the
> order and whilst all of the variables are yet to be written to the
> database?
>
> Thanks very much for your help.
>
> Cheers
> Warwick
>
> --
> NZ PHP Users Group: http://groups.google.com/group/nzphpug
> To post, send email to [email protected]
> To unsubscribe, send email to
> [email protected]



-- 
Bob Brown, [L|W]AMP Web Developer
[email protected], http://www.guru.net.nz

-- 
NZ PHP Users Group: http://groups.google.com/group/nzphpug
To post, send email to [email protected]
To unsubscribe, send email to
[email protected]

Reply via email to