Bonjour, j'ai mon ptit outil Marco's_interceptor qui me crie pour la première fois, 7 messages ce matin, à 9h47.
Votre avis ?
Je suis sur hébergement mutualisé, LWS.com
** PATTERNS MATCHED (possible hack attempts)
* Local File Inclusion $_GET['iccaldate'] => ../../../../../../../etc/passwd
* Local File Inclusion $_REQUEST['iccaldate'] => ../../../../../../../etc/passwd
** PAGE / SERVER INFO
*REMOTE_ADDR : 105.100.42.98
*HTTP_USER_AGENT : Mozilla/5.0 (Windows NT 10.0; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0
*REQUEST_METHOD : GET
*QUERY_STRING : iccaldate=..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2 fpasswd
** SUPERGLOBALS DUMP (sanitized)
*$_GET DUMP:
Array
(
[iccaldate] => ../../../../../../../etc/passwd
)
*$_POST DUMP:
Array
(
)
*$_COOKIE DUMP:
Array
(
[PHPSESSID] => pplm7efd0i2qojihar7sgbh6u6
[1f5327e098466d7d0c645790ead8858c] => ltrquftfor3ujlv5g1rfrkm4l0
[templateColor] => red
)
*$_REQUEST DUMP:
Array
(
[iccaldate] => ../../../../../../../etc/passwd
)
Votre avis ?
Je suis sur hébergement mutualisé, LWS.com
** PATTERNS MATCHED (possible hack attempts)
* Local File Inclusion $_GET['iccaldate'] => ../../../../../../../etc/passwd
* Local File Inclusion $_REQUEST['iccaldate'] => ../../../../../../../etc/passwd
** PAGE / SERVER INFO
*REMOTE_ADDR : 105.100.42.98
*HTTP_USER_AGENT : Mozilla/5.0 (Windows NT 10.0; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0
*REQUEST_METHOD : GET
*QUERY_STRING : iccaldate=..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2 fpasswd
** SUPERGLOBALS DUMP (sanitized)
*$_GET DUMP:
Array
(
[iccaldate] => ../../../../../../../etc/passwd
)
*$_POST DUMP:
Array
(
)
*$_COOKIE DUMP:
Array
(
[PHPSESSID] => pplm7efd0i2qojihar7sgbh6u6
[1f5327e098466d7d0c645790ead8858c] => ltrquftfor3ujlv5g1rfrkm4l0
[templateColor] => red
)
*$_REQUEST DUMP:
Array
(
[iccaldate] => ../../../../../../../etc/passwd
)
Commentaire