On Wed, Jan 30, 2013 at 5:08 PM, Michael Petch <mpe...@capp-sysware.com>wrote:

> On 2013-01-30 08:41, Øystein Schønning-Johansen wrote:
> > Something like that. I've cleaned out the shit, and I think it works
> > agian, but I guess the PHP injection hole is still there. I can check
> > the access logs and the other logs I got. The attack was performed
> > yesterday.
> > Thnaks to Louis for reorting this in the first place.
>

(Good spelling, Øystein!)


> >
>
> I noticed that the board images that are on the right hand side of the
> www.gnubg.org main page don't appear properly. I also observed for the
> last few minutes that if you paste this command into the browser you get
> redirected to that fantasy site:
>
> http://www.gnubg.org/phpThumb/phpThumb.php?src=/shots/gnubg_win.png&w=140
>
> While I was writing this email it seems to have been corrected, but it
> has me wondering if phpthumb was the point of attack, as mentioned here:
>
> http://forums.modx.com/index.php/topic,55314.0.html
>
>
I think you're spot on! I'll see if I can close these vulnerabilities later
this week. Maybe time to update nucleus as well...

-Øystein
_______________________________________________
Bug-gnubg mailing list
Bug-gnubg@gnu.org
https://lists.gnu.org/mailman/listinfo/bug-gnubg

Reply via email to