Forum Moderators: Robert Charlton & goodroi
Not sure if this is the correct group, but I just found out a nasty thing today.
I was going through Google's Webmaster tools and going through the Content Analysis pages and saw approx 600 pages without a title tag.
Took a look and found out that a site has been linking a redirect code I have on my site. So all the URL's looked something like
http://www.example.com/redirect?id=53763&url=http://example.com/tds/go/sid/3/q/
After the 3/q/ follows a varied list of adult related keywords.
I went and immediately went and plugged that particular hole. But then when searching for that domain using inurl: I found a huge list of professional (non-adult) websites being hijacked in the same manner.
Taking a look at quantcast, they seem to have started in mid december and gotten a huge turnover using this method. Ranked ~ 5000
Take a good look at all you redirect code and make sure its locked tight,.
Regards
[edited by: tedster at 4:34 pm (utc) on Jan. 15, 2009]
[edit reason] switch to example.com [/edit]
The problem is with code that takes in the whole url as a parameter and no ID's. (or ID's + URL but does not verify the combination)
Making it very easy for external sites to link to themselves by linking to yours.
If you do have a redirect code that takes an URL as a parameter. Simply copy the redirect link (any link) and try replacing the external url with anything else (webmasterworld.com for example), if you get a resp 200 and get redirected, then you have this particular security hole open.
[webmasterworld.com...]
The problem is resolved in Plesk 8 and above since the redirect script no longer appears to be in use.
Sometimes publicizing these products as vulnerable, unless it's your own code, will get people to correct the problems.