PEAK XOOPS - Re: Installer Attack in englishin japanese

Top  >  Comments  >  News comment ()

Re: Installer Attack

  • As this forum is only for commentation, you cannot open a new topic
  • Guests cannot post into this forum
Target News
Subject インストーラアタック
Summary XOOPS (Cube2.1も) でinstallフォルダを残しておくと、管理画面で警告が出ます。というのも、installフォルダを経由すれば、DBパスワードなどがダダもれになってしまうからです。ただ現実に、アップグレード時にintallフォルダもアップロードしてしまうとか、installフォ...
Previous post - Next post | Parent - Children.1 | Posted on 2007/6/3 8:22
tl  三等軍曹   Posts: 84
Well, if people have been reminded constantly by Xoops Admin and don't even bother to remove the install directory, they may deserve to be attacked and not worthy of Protector protection?
Votes:0 Average:0.00
Previous post - Next post | Parent - No child | Posted on 2007/6/3 17:01 | Last modified
GIJOE  先任軍曹   Posts: 4110
hi tl.

Quote:

tl wrotes:
Well, if people have been reminded constantly by Xoops Admin and don't even bother to remove the install directory, they may deserve to be attacked and not worthy of Protector protection?

I know several XOOPS sites with '_install' directory.
Attackers can know the sites informations easily via accessing XOOPS_URL/_install/index.php

Of course, there are too many patterns of renaming by users.
(install_, install.bak etc.)
admin.php cannot search all patterns.

Just adding a line checking whether '_INSTALL_CHARSET' is defined or not makes all patterns safe.
(The line is enough light to be ignored)

Thus, I've judged this is worthy code for Protector.
Votes:1 Average:10.00

  Advanced search


Login
Username or e-mail:

Password:

Remember Me

Lost Password?

Register now!