Never heard of such an abuse neither.
Only we are victim of one such.
So I would be interessted in any findings
Robert
Am Dienstag, 14. Oktober 2003 03:46 schrieb Paul Winkler:
> On Mon, Oct 13, 2003 at 05:36:51PM -0700, Chris Pelton wrote:
> > Hello,
> >
> > I'm trying to do some forensics on
I'm seeing the following behaviour in Zope2.7b2 (python 2.3.2) on a relatively
fast computer (Athlon 1.8GHz):
1. request comes in which modifies ZODB
2. code handling request replies with REQUEST.RESPONSE.redirect()
3. redirected page uses data input at step 1 (specifically, it's auth info)
bu
On Mon, Oct 13, 2003 at 05:36:51PM -0700, Chris Pelton wrote:
> Hello,
>
> I'm trying to do some forensics on a redhat 6.2 box that was somehow
> turned into a mail relay and may have been compromised. The mail logs
> show the mail coming from an apache virtual host address, and this
> machine
Chris Pelton wrote:
> So, would anybody have any ideas how to determine if this might have
> been compromised? Or is there a known mail relay exploit through zope
> somehow? I've checked system binaries and everything seems fine. None of
> the python files seem to have been changed since well be
Hello,
I'm trying to do some forensics on a redhat 6.2 box that was somehow
turned into a mail relay and may have been compromised. The mail logs
show the mail coming from an apache virtual host address, and this
machine was running zope, and the list of hotfix files I see is:
5220 May 25 200
Hello ppl,
Could anyone tell me whether Zope 2.5.1 supports Transfer-Encoding: chunked
feauture of HTTP/1.1 for handling client request, such as sending a decent
amount of data, e.g. file upload?
I get Bad Request error with response code 400.
I am pretty confident about the request correctness i