It was a postnuke/xmlrpc exploit that went public just last July.
Here are a couple of links for reference:
http://seclists.org/lists/bugtraq/2005/Jul/0195.html
http://www.webhostingtalk.com/archive/thread/421520-1.html
http://news.netcraft.com/archives/2005/07/04/php_blogging_apps_vulnerable_to_xmlrpc_exploits.html
Holden Hao wrote:
On Fri, 05 Aug 2005 10:47:39 +0800
Cupid Soriano <[EMAIL PROTECTED]> wrote:
Yup. It was remedied the day after.
It was irritating, frustrating and a rude wake-up call all rolled into
one. That's what we get for not upgrading and monitoring our own mail
web server regularly.
How did they get in exactly? And how was it fixed?
Holden
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph