help with Exploit
Posted: 18 May 2022, 12:43
Hi,
sorry for question i am not expert of csx.I have a lot of alert from csx from different account.
example:
Scanning web upload script file...
Time : Wed, 18 May 2022 12:48:55 +0200
Web referer URL : www.google.com
Local IP : 51.255.xx.xx
Web upload script user : nobody (99)
Web upload script owner: xxxx(1017)
Web upload script path : /home/xxxx/public_html/wp-admin/admin-ajax.php
Web upload script URL : https://xxxx.it/wp-admin/admin-ajax.php
Remote IP : 217.xx.xx.xx
Deleted : No
Quarantined : Yes [/home/quarantine/cxscgi/20220518-124855-YoTPFzLid5hmo5CNLpRzTgAAAIE-file-LXcXV7.1652870935_1]
'/tmp/20220518-124855-YoTPFzLid5hmo5CNLpRzTgAAAIE-file-LXcXV7'
(compressed file: .sp3ctra_XO.php [depth: 1]) Known exploit = [Fingerprint Match] [PHP Upload Exploit [P2000]]
file is blocked and quarantine so i think i am safe. but how stop this? and where is the problem ? i can prevent it?
thanks for help
sorry for question i am not expert of csx.I have a lot of alert from csx from different account.
example:
Scanning web upload script file...
Time : Wed, 18 May 2022 12:48:55 +0200
Web referer URL : www.google.com
Local IP : 51.255.xx.xx
Web upload script user : nobody (99)
Web upload script owner: xxxx(1017)
Web upload script path : /home/xxxx/public_html/wp-admin/admin-ajax.php
Web upload script URL : https://xxxx.it/wp-admin/admin-ajax.php
Remote IP : 217.xx.xx.xx
Deleted : No
Quarantined : Yes [/home/quarantine/cxscgi/20220518-124855-YoTPFzLid5hmo5CNLpRzTgAAAIE-file-LXcXV7.1652870935_1]
'/tmp/20220518-124855-YoTPFzLid5hmo5CNLpRzTgAAAIE-file-LXcXV7'
(compressed file: .sp3ctra_XO.php [depth: 1]) Known exploit = [Fingerprint Match] [PHP Upload Exploit [P2000]]
file is blocked and quarantine so i think i am safe. but how stop this? and where is the problem ? i can prevent it?
thanks for help