It was a postnuke/xmlrpc exploit that went public just last July.

Here are a couple of links for reference:

http://seclists.org/lists/bugtraq/2005/Jul/0195.html
http://www.webhostingtalk.com/archive/thread/421520-1.html
http://news.netcraft.com/archives/2005/07/04/php_blogging_apps_vulnerable_to_xmlrpc_exploits.html



Holden Hao wrote:
On Fri, 05 Aug 2005 10:47:39 +0800
Cupid Soriano <[EMAIL PROTECTED]> wrote:


Yup. It was remedied the day after.

It was irritating, frustrating and a rude wake-up call all rolled into
one. That's what we get for not upgrading and monitoring our own mail web server regularly.


How did they get in exactly?  And how was it fixed?


Holden _________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph


_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to