08-01-2011
Web hosting security question
Hi,
Recently my has been hacked. A .pl script has been uploaded in the root of the directory, which uploaded lot of unwanted files and changed their file permission to 777.
I have no clue how did they upload that .pl file in my hosting.
Website is in shared hosting. Could they access my web root from other website which hosted in the same server?
Or any idea how could they reached my site root?
4 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I built my website based on Dreamweaver, on Windows platform. My server uses Unix, and the page doesn't look too good. Is there any way to solve this problem without too much of a headache? (1 Reply)
Discussion started by: PCL
1 Replies
2. Cybersecurity
Hello, guys !
The company I work for has a few web hosting servers and I'd like to know how can I secure the servers a little bit ?
The situation is like this:
Apache runs as nobody so all users can run scripts as nobody. This is a big security problem beacause if I have an account on the... (4 Replies)
Discussion started by: Sergiu-IT
4 Replies
3. Web Development
Hi All,
Frankly I'm new to Linux Environment. While we are trying to Host an ASP.NET 5 Web Application on Centos OS7 Web hosting Server. There were couple of steps which we are supposed to go through, please see this link -
We are stuck at Create a Container & then Running the Container,... (1 Reply)
Discussion started by: John Fredric
1 Replies
4. Shell Programming and Scripting
Hi..
I have very limited knowledge on LDAP and its configuration and but I have been trying to figure out one issue that takes place when I am running the program that is written in php, but so far its unsuccessful.
The server, I am working on is ldap server, which is running on Apache. After... (1 Reply)
Discussion started by: GomathiUoM
1 Replies
LEARN ABOUT CENTOS
reporter-upload
REPORTER-UPLOAD(1) LIBREPORT MANUAL REPORTER-UPLOAD(1)
NAME
reporter-upload - Uploads compressed tarball of problem directory.
SYNOPSIS
reporter-upload [-c CONFFILE]... [-d DIR] [-u URL]
DESCRIPTION
The tool is used to create a compressed tarball of the problem directory and upload it to a URL. Supported protocols include FTP, FTPS,
HTTP, HTTPS, SCP, SFTP, TFTP and FILE.
Configuration file
Configuration file contains entries in a format "Option = Value".
The options are:
URL
The URL where tarball should be uploaded.
Integration with ABRT events
reporter-upload can be used as a reporter, to allow users to upload compressed tarballs of problem directories to a configured URL. This
usage can be configured in /etc/libreport/report_event.conf:
EVENT=report_Upload reporter-upload
It can be also used on the post-create event to upload it automatically.
EVENT=post-create reporter-upload
OPTIONS
-d DIR
Path to problem directory.
-c CONFFILE
Path to configuration file. When used in ABRT event system, the file contains site-wide configuration. Users can change the values via
environment variables.
-u URL
The URL where tarball should be uploaded. URL should have form protocol://[user[:pass]@]host/dir/[file.tar.gz] where protocol can be
http(s), ftp, scp, or file. File protocol can't have user and host parts: file.tar.gz[1]. If URL ends with a slash, the archive name
will be generated and appended to URL; otherwise, URL will be used as full file name.
ENVIRONMENT VARIABLES
Environment variables take precedence over values provided in the configuration file.
Upload_URL
The URL where should be the tarball uploaded.
AUTHORS
o ABRT team
NOTES
1. file.tar.gz
file:///dir/
LIBREPORT 2.1.11 06/18/2014 REPORTER-UPLOAD(1)