That is a VERY old issue from the PHP4 days... This script kiddie should point their script over at Karjackistan or some such place where everyone is still rocking Windows for Workgroups. Gah.
-- Mitch On Tue, Mar 9, 2010 at 12:43 AM, Gary Mort <[email protected]> wrote: > > > On Mon, Mar 8, 2010 at 11:22 PM, Web Project <[email protected]> wrote: >> >> Hi, >> >> My log watch detected the following request on my Joomla site. -- >> >> index.php?module=search&q=./../../../../../../../../etc/passwd >> >> Is this sort of thing a known exploit? > > That is not even a joomla function. > Joomla functions would be options=com_something&task=sometask&q=something > It's more likely an exploit for some other set of PHP code and their just > scanning every website for it. > _______________________________________________ > New York PHP SIG: Joomla! Mailing List > http://lists.nyphp.org/mailman/listinfo/joomla > > NYPHPCon 2006 Presentations Online > http://www.nyphpcon.com > > Show Your Participation in New York PHP > http://www.nyphp.org/show_participation.php > _______________________________________________ New York PHP SIG: Joomla! Mailing List http://lists.nyphp.org/mailman/listinfo/joomla NYPHPCon 2006 Presentations Online http://www.nyphpcon.com Show Your Participation in New York PHP http://www.nyphp.org/show_participation.php

