Looking to save some money, and my web hosting contract is up, so
I'm looking at backing up 10 years of IMAP mail and a wordpress site
to prepare to move to a new provider. I deleted close to a 100
megabytes
I got rid of a wordpress site the other day, got sick of the attempted logins by bots etc... so went to a static HTML site - it's bliss now
:)
I find it frustrating that although file permissions are all set to 600
or 644 for the plain html files, the buggers can still make changes to them.
Ogg wrote to Avon <=-
Don't rest TOO easy. I had an index.html infection (added code) on several plain html-based pages. (I changed the http to hxxp below).
Ogg wrote to Avon <=-
Don't rest TOO easy. I had an index.html infection (added code) on
several plain html-based pages. (I changed the http to hxxp below).
Weird - how, if you're not running scripts on the server?
My wordpress site got hit about 6 years ago, every single php file
was infected. Pain in the ass to clean up.
Luckily, the php screwed up my formatting and made it clear something
wasn't right, otherwise I wouldn't have known.
I find it frustrating that although file permissions are all set to
600 or 644 for the plain html files, the buggers can still make
changes to them.
Man, how?!? Plain text things (or whatever you want to count HTML is, without scripting) are so read only, and yet...
Nasty vulnerability, whatever it is.
Buggers.
I find it frustrating that although file permissions are all set to 600
or 644 for the plain html files, the buggers can still make changes to them.
Buggers.644 fo
I find it frustrating that although file permissions are all set to 600 or
the plain html files, the buggers can still make changes to them.
I find it frustrating that although file permissions are all set to
600 or 644 fo the plain html files, the buggers can still make changes
to them.
Hahaha. Did you find the penetration point?
I find it frustrating that although file permissions are all set to
600 or 644 for the plain html files, the buggers can still make
changes to them.
Man, how?!? Plain text things (or whatever you want to count HTML is,
I am guessing that it's a php exploit ELSEWHERE on the same/shared server that then explores the rest of the user accounts.
I am guessing that it's a php exploit ELSEWHERE on the same/shared
server that then explores the rest of the user accounts.
Would seem to imply you have accounts with more permissions than they
need. I had a round of SQL injection the first time I set it up... but after that made the approriate code use an SQL user that only had read permissions.
Much the same theory with the old crontab injections I used to get. Although I knew they were going to be arriving via the old BBS account setup.....
So in short, anyone that doesn't need access to /var/www or whatever your equivalent is, take the write permissions off them completely.
I don't know if WP requires write access itself to just function... if
you can just run it with no write permissions... and edit it with
another account that does have write access...
Sysop: | sneaky |
---|---|
Location: | Ashburton,NZ |
Users: | 31 |
Nodes: | 8 (0 / 8) |
Uptime: | 38:26:33 |
Calls: | 2,096 |
Files: | 11,142 |
Messages: | 949,859 |