Forum Moderators: phranque
What is the person that is doing this hoping to accomplish? There is no cgi-bin folder on this domain, but there is a PHORUM PHP discussion area (with nothing much in it...)
This is the third time this has happened this month.
Is this something to worry about? Is someone looking for a way to relay email?
Yes, just like you can scan a host for open ports; so too can you scan a web server for vulnerable scripts; which is what you are seeing.
Nothing to worry about - as long as you aren't running a vulnerable version of any of the scripts that it is scanning for.
It's also disturbing to see how many people leave a "from" and "to" as hidden form fields for all the spammer-bots to read.
My mailer class is only called after checkout, and then not directly triggered by a form request. If not I'd be paranoid that I could suffer from the same attack as microcars.
If you use a form on your site, and if it has a commonly known name, it could be vulnerableno matter how you call it.
Then check which version of apache you are running and make sure it's the latest ..some of the older ones .( and there are still some very big host companies who haven't taken the trouble to update yet ) have some very porous shells ...even a simple page request and older apaches will send back "nope password page wasn't where you asked ..it's here" ..really!
Never really a good idea to have anything that lets anyone write anything on your server ..unless you know exactly what you are doing /seeing ...