Community forum to discuss cxs.
If you believe that there is a problem with your cxs installation and want support then, as a paid product, you should use the helpdesk after having consulted the documentation.
We are seeing dozens of emails every day alerting us to files being uploaded to /tmp by web scripts, some of which do not even exist. I am guessing that the bad guys are POSTing blindly, and the files are uploaded to /tmp until they are finished uploading, then when the script doesn't exist or handle the upload, the hack is failed and the bad guys move on.
May i know if there is a list or online database that provide more information on the type of exploit that is causing the files to be quaratined inside CXS ?
For example the exploit below P0966 is there more information to be found on the type of exploit it is, what it does etc ?
I realized that the function (W) world writable directory (777) and chmod to 755
stopped working. I discovered the problem after trying to fix permissions for an account, as I often do. To my surprise the files with 777 permissions were not detected nor mentioned in the log CSX.
I do not always when the problem started or what version. I'm currently using the version 5.30, and problem occurs on...
With a few hundred accounts on the server, the weekly scan report from CXS is gigantic and difficult to read. In fact, in GMail, only about 1/4 of the report is displayed (the rest is truncated)
Much of the report shows accounts that have had no suspicious files or any matches of any kinds. i.e. the accounts are perfectly fine.
Is there a way to have the weekly report only send me a list of...
I have several dozen files on my server that are the source of a symlink attempted attack. CXS did not see these files. Would you like a copy if that's useful?
With the popularity of WordFence I am seeing more and more of these. My ignore does not seem to work. What is the proper ignore rule for ignoring the wfcache folder globally?
I got users with scripts that are chmoding themselves as 777.
Others uploading them this way.
Anyway for whatever reason, there are directories with 777 permissions.
I don't really care, cagefs does the work well. But what concerns me is cxswatch.
I may get ~500 mails per day per server that is 4000 mails in a day only
for warnings about world writable directories.
Upgrading cxs from v5.10 to 5.11...
Retrieving new cxs installer...
...100%
Unpacking new cxs package...
gzip: stdin: unexpected end of file
tar: Child returned status 1
tar: Error is not recoverable: exiting now
sh: line 0: cd: /usr/src/cxs: No such file or directory
sh: install,sh: No such file or directory
Tidying up...
...All done.
?????
Can I have cxs run a custom script before reporting or acting on a possible threat, so that the script itself can rule out false-positives or take action?
I've been getting a lot of useful hits on social.png files being uploaded via ftp. These are potentially dangerous, as they could be from the CryptoPHP malware. However, a simple check using the file command can tell me whether it's PHP script...
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum