Am 07.07.2014 22:44, schrieb Ben Johnson:
> On 7/7/2014 2:47 PM, Ben Johnson wrote:
>> Thanks, Leonardo and Noel! I really appreciate the prompt replies.
>>
>> Leonardo, I see no indication that whomever is sending this mail has
>> authenticated. And given that local connections are permitted to send
>> mail without authenticating on this server, I will pursue Noel's
>> suggested course of action next.
>>
>> I'll let you know if I can't find the source...
>>
>> Thanks again,
>>
>> -Ben
> 
> You were right!
> 
> It was a compromised Joomla site. I was able to spot it almost
> immediately due to excessive CPU usage.
> 
> What's disconcerting is that the Joomla site is completely up-to-date,
> including all extensions, so the vulnerability is either zero-day or
> with another stack component. But that's here nor there

more likely it is using one of the tons of crap plugins written by a monkey
i faced Joomla plugins with code nobody right in his brain ever writes like
"file_put_contents($random_request_var, $random_request_var); in some gallery
plugin years ago

most plugins are written by clueless people for their own needs which
think they do someboddy a favor by make them public and no longer care
for updates as never cared for security by missing knowledge

rule 1: don't install Joomla if you care for security at all
rule 2: if you think you need it anyways don't install random plugins

the most important rule: *never ever* allow endusers to install any plugin

Reply via email to