![]() |
1
16
我认为问题不在于你使用的是共享主机,因为我发现了另外六个主机( degmsb , Benvolio , joomla01 , DJ-Alien , valerione1979 和 Kars ) whose websites had the same script added. Also, it is doubtful that any of your files would be writable by others because files that are uploaded over FTP are subject to the file creation mode bits mask. 我的最佳猜测是,有人正在使用已知的漏洞或针对共同弱点的漏洞攻击网站,而此人正在用 Google hacking . degmsb's Wordpress website and Benvolio's Burning Board Lite website were likely cracked via known exploits (possibly known exploits of plugins to these software bases such as TinyMCE), and your website, since you wrote it yourself, was likely cracked via an exploit against a common website weakness.
考虑到您允许文件上传(您的一个PHP脚本接受并保存您的用户上传的文件),我会考虑
CWE-434: Unrestricted Upload of File with Dangerous Type
. A CWE-434 exploit works like this: suppose you allow users to upload avatar images or pictures. The script to which uploaded images are POSTed might save the file to
另一种可能是php收到的上传文件名,
编辑:
它
looks like
编辑2:
查找的副本
this PHP source
(部分)
EdTe3: Googling parts of the PHP script, I have found several webpages where this source is listed verbatim, and all of these pages have something to do with file uploading functionality for the respective websites. It therefore seems very likely that the hacker of your website used a CWE-434 exploit. |
![]() |
2
7
|
![]() |
3
3
你和谁在一起?一些招待员有可能被利用的安全漏洞。 Are you using WordPress? There's also been an number of reported outbreaks. The best thing to do would be google it looking for people with similar problems, which will also lead to the cause, which will lead to the solutions. |
![]() |
4
3
As others have suggested, the vulnerability is most likely in some script you are using, maybe something you've written yourself or then a well known application that has known vulnerabilities. This might be a vulnerability in an upload script, but I want to point out that it is also possible to "upload" files through SQL injection, see the following thread for more details |
![]() |
5
2
We have experienced a problem similar to this a while ago with one of our major web properties. What your web host said was correct: it was likely due to not FTP access, but an insecure script that somehow allowed modification of arbitrary files. In our case, a vulnerability in an old phpMyAdmin allowed changes to some PHP scripts. 读取特权 to all scripts and HTML files. It turns out that Apache could also write to scripts in our case. 简单地
|
![]() |
6
1
I would suggest changing any FTP or SSH passwords to be very secure. If you use a hosting provider you should also notify them of the breach. If you do not have logs to investigate the matter then they may. You should also Google the code that was added to your page to see if you can find anything else. |
![]() |
7
1
If you're on a shared server, other people have access to the server itself. This is sort of the definition of a shared server. The problem is that if you have files with permissions of 777, they are world-user-group writable. Which means anyone with access to the box can write to them. See the problem? 它所需要的就是 一 person on that box to have a weak password, poorly configured script, or a horrible bit of code, and a mediocre script kiddie can cause all kinds of problems all over the box. Most of these attacks are purely automated. They get access, scan for attack-able files, and append as needed. Most likely, you should change all of your files to 755 or 644 permissions. You'll sleep better at night.
|
![]() |
8
1
最 of the access points are which could be exploited. Unfortunately, that may not be good enough (writing and maintaining secure web applications is harder than most people think). 如果你 没有 您自己编写应用程序,或者如果您使用的是其他人编写的大型、复杂的组件,或者如果您只是需要帮助来处理网站安全问题,那么有一些商业服务可以对您的网站进行爬行,并尝试找出它们的弱点,例如:
显然,这些服务要花钱,但你通常可以得到“免费试用”,看看它们是否有用。祝你好运! |
![]() |
9
0
如果您有静态IP-您可以禁止非您的IP进行FTP访问 |
![]() |
10
0
这在我身上发生过一段时间,以不同的方式。工作帐户通过phpbb通过代码漏洞被破坏。不知怎么的,他们甚至将自己添加到mysql db users表中。这导致我们完全删除程序并停止使用。 一个旧的joomla安装是一个漏洞,允许人们做你所说的我的个人网站。我忘了它甚至在外面,但它足以为他们打开大门,在几个不同的网站上安装恶意代码。我关闭了网站,更改了权限,更新了joomla,并删除了文件。 My current production server gets "sniffed" for phpMyAdmin more than 1000 times per hour during some peak hack attempts. The bad guys are working overtime! 底线是,要小心开源代码,如果你真的使用它,更新,更新,更新。 |
![]() |
Softly · 单选按钮未按预期取值 1 年前 |
|
SlickRed · 我无法使用JS关注HTML元素 1 年前 |
![]() |
assembler · Nextjs没有处理发布请求 1 年前 |
|
BADRUM · 执行两个获取功能后,如何导航回页面? 1 年前 |
![]() |
Toniq · javascript为php保存多维数组 1 年前 |