That is a VERY old issue from the PHP4 days... This script kiddie
should point their script over at Karjackistan or some such place
where everyone is still rocking Windows for Workgroups. Gah.

-- Mitch

On Tue, Mar 9, 2010 at 12:43 AM, Gary Mort <[email protected]> wrote:
>
>
> On Mon, Mar 8, 2010 at 11:22 PM, Web Project <[email protected]> wrote:
>>
>> Hi,
>>
>> My log watch detected the following request on my Joomla site. --
>>
>>     index.php?module=search&q=./../../../../../../../../etc/passwd
>>
>> Is this sort of thing a known exploit?
>
> That is not even a joomla function.
> Joomla functions would be options=com_something&task=sometask&q=something
> It's more likely an exploit for some other set of PHP code and their just
> scanning every website for it.
> _______________________________________________
> New York PHP SIG: Joomla! Mailing List
> http://lists.nyphp.org/mailman/listinfo/joomla
>
> NYPHPCon 2006 Presentations Online
> http://www.nyphpcon.com
>
> Show Your Participation in New York PHP
> http://www.nyphp.org/show_participation.php
>
_______________________________________________
New York PHP SIG: Joomla! Mailing List
http://lists.nyphp.org/mailman/listinfo/joomla

NYPHPCon 2006 Presentations Online
http://www.nyphpcon.com

Show Your Participation in New York PHP
http://www.nyphp.org/show_participation.php

Reply via email to