Security attack...

This is a new one i got today...

Total impact: 30
Affected tags: dt, id, lfi

Variable: REQUEST.language_id | Value: ../../../../../../../../../../../../../etc/passwd\0
Impact: 15 | Tags: dt, id, lfi
Description: Detects basic directory traversal | Tags: dt, id, lfi | ID: 10
Description: Detects specific directory and path traversal | Tags: dt, id, lfi | ID: 11
Description: Detects etc/passwd inclusion attempts | Tags: dt, id, lfi | ID: 12

Variable: GET.language_id | Value: ../../../../../../../../../../../../../etc/passwd\0
Impact: 15 | Tags: dt, id, lfi
Description: Detects basic directory traversal | Tags: dt, id, lfi | ID: 10
Description: Detects specific directory and path traversal | Tags: dt, id, lfi | ID: 11
Description: Detects etc/passwd inclusion attempts | Tags: dt, id, lfi | ID: 12

REMOTE_ADDR: 95.131.66.198
HTTP_X_FORWARDED_FOR:
HTTP_CLIENT_IP:
SCRIPT_FILENAME: /home/admin/domains/xxxxxxxxxl/public_html/index.php
QUERY_STRING: language_id=../../../../../../../../../../../../../etc/passwd%00
REQUEST_URI: //?language_id=../../../../../../../../../../../../../etc/passwd%00
QUERY_STRING: language_id=../../../../../../../../../../../../../etc/passwd%00
SCRIPT_NAME: /index.php
PHP_SELF: /index.php

Kids first
Quote · 27 Feb 2010

http://www.boonex.com/unity/forums/#topic/Possible-security-attack--2010-02-27.htm

Quote · 27 Feb 2010
 
 
Below is the legacy version of the Boonex site, maintained for Dolphin.Pro 7.x support.
The new Dolphin solution is powered by UNA Community Management System.