新聞中心
源頭在于wiki.php.net的漏洞導(dǎo)致wiki賬號(hào)被盜,而wiki的賬號(hào)和php代碼源的SVN提交權(quán)限相關(guān)聯(lián)。

十載專(zhuān)注成都網(wǎng)站制作,企業(yè)網(wǎng)站設(shè)計(jì),個(gè)人網(wǎng)站制作服務(wù),為大家分享網(wǎng)站制作知識(shí)、方案,網(wǎng)站設(shè)計(jì)流程、步驟,成功服務(wù)上千家企業(yè)。為您提供網(wǎng)站建設(shè),網(wǎng)站制作,網(wǎng)頁(yè)設(shè)計(jì)及定制高端網(wǎng)站建設(shè)服務(wù),專(zhuān)注于企業(yè)網(wǎng)站設(shè)計(jì),高端網(wǎng)頁(yè)制作,對(duì)被動(dòng)防護(hù)網(wǎng)等多個(gè)領(lǐng)域,擁有多年的網(wǎng)站維護(hù)經(jīng)驗(yàn)。
有圖有真相:
原文:
The wiki.php.net boxwas compromised and the attackers were able to collect wiki account credentials. No other machines in the php.net infrastructure appear to have been affected. Our biggest concern is, of course, the integrity of our source code. We did an extensive code audit and looked at every commit since 5.3.5 to make sure that no stolen accounts were used to inject anything malicious. Nothing was found. The compromised machine has been wiped and we are forcing a password change for all svn accounts.
We are still investigating the details of the attack which combined a vulnerability in the Wiki software with a Linux root exploit.
內(nèi)容大致是:
由于wiki賬號(hào)被盜,PHP的代碼源極有可能被污染,當(dāng)然,PHP團(tuán)隊(duì)已經(jīng)做最大的努力以保證自PHP5.3.5版本的代碼沒(méi)有收到污染,并且強(qiáng)迫SVN修改現(xiàn)有的密碼。
而事件目前的狀態(tài)是,他們?nèi)匀粵](méi)法鎖定漏洞所在,因?yàn)樗麄內(nèi)栽谂挪椤?/p>
一個(gè)很明顯的問(wèn)題是,PHP5.3.6以及其后續(xù)版本的代碼已經(jīng)被污染,目前只能把未受污染的代碼版本確保到PHP5.3.5,下載PHP代碼的人,要小心了。
而windows.php.net和wiki.php.net也已經(jīng)暫停訪問(wèn)。
文章來(lái)源:http://www.cnbeta.com/articles/138261.htm
網(wǎng)站名稱(chēng):發(fā)現(xiàn)wiki.php.net漏洞PHP代碼源被黑
轉(zhuǎn)載源于:http://www.fisionsoft.com.cn/article/dhhojpj.html


咨詢(xún)
建站咨詢(xún)
