Barney's Blog

Blog archive

PHP Hole Exploited by Hackers

Hackers really have no conscience. Why else would they attack PHP? What did PHP ever do to them? But yet, that's exactly what they did. They found flaws in the revered Web scripting language and gone right after them.

One flaw lets these creepbags install their own malware (probably just a slight rework of something some other creepbag wrote -- which was, itself, just a rework of something some other creepbag found and fiddled with) or rip off your source code.

These jerks are out and about with this attack, as Trustwave SpiderLabs found direct evidence in its honeypot earlier this week.

The PHP Group Web site has info on how you can to see if your Web site is vulnerable and has already released emergency fixes.

Posted by Doug Barney on 05/11/2012 at 1:19 PM


Featured

  • Windows 10 Preview Adds Windows Subsystem for Linux 2 on ARM64 Devices

    Microsoft's latest Windows 10 preview release for testers (build 18980), announced on Wednesday, includes support for version 2 of the Windows Subsystem for Linux, plus ARM64 device support for WSL 2.

  • Microsoft Defender Advanced Threat Protection Evaluation Lab Now Available

    The Microsoft Defender Advanced Threat Protection (ATP) Evaluation Lab is now ready for use by organizations.

  • How Organizations Can Adapt to SharePoint's 'Modern' Shift

    In a September interview, SharePoint expert Asif Rehmani described how users, developers and organizations are dealing with SharePoint Online's so-called "modern" innovations.

  • Microsoft Urges LDAP Workaround Fix for Windows Systems

    Microsoft updated an August security advisory this week to urge organizations using the Lightweight Directory Access Protocol in supported Windows systems to implement some configuration changes manually.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.