Questions tagged [server-side-attacks]
65 questions
11
votes
4 answers
Malicious/Executable file upload prevention using regex validation on file extension
A co-worker today made a bet with me that he knows of a way to supply a specially formatted string that could pass the following regex check and still supply a file name with extension .php or .jsp or .asp:
if…

astralmaster
- 2,344
- 11
- 50
- 84
10
votes
1 answer
by looking at nginx error log, Is my server under attack?
Here is portion of nginx eror log on ubuntu 18.04. There is a constant http request to my nodejs server. My question is that is the server under attack? By looking online, 52.69.23.0/255.255.255.0 is a block from Tokyo, Japan.
2019/10/02 02:50:03…

user938363
- 9,990
- 38
- 137
- 303
5
votes
1 answer
Is someone trying to hack my server? Please tell me what can I do?
I found these requests in my servers log file. I am using nodejs on amazon EC2. …

aMother
- 893
- 8
- 19
4
votes
1 answer
Is there a way in google cloud to block attempt to access specific urls
I have a VM instance that receives a lot of spam/bot traffic attempting to hack the instance such as New Request to /blog/wp-includes/wlwmanifest.xml. Although none of these are successful it adds strain to the instance.
Is it possible to block…

sam
- 1,005
- 1
- 11
- 24
4
votes
1 answer
How do PyMySQL prevent user from sql injection attack?
Sorry for ask here but I cannot found much reference about pymysql's security guide about how do we prevent sql injection,
When I do PHP develope I know use mysql preparedstatement(or called Parameterized Query or stmt),but I cannot found reference…

Jason117
- 107
- 2
- 7
3
votes
1 answer
.php file is getting replaced with .php.suspected - Wordpress AWS
Recently my wordpress site got hacked and i solved it by reinstalling the backup version of wp-content folder and also running and repairing wordfence plugin in the site. But my website is showing an error with 500 and when i found the problem was…

Zammuuz
- 708
- 4
- 18
- 43
3
votes
0 answers
Logjam determine if site is vulnerable
Recently one more TLS attack was published: Logjam. The issue has a really clear description and demonstrated that sites that use 512 key size are vulnarable and it takes up to 10 mins to "decrypt client server keys exchanges".
Based on the attack…

user1459144
- 4,439
- 5
- 28
- 35
3
votes
0 answers
Are urls included in DDOS xmlrpc attacks passive, compromised participants or active participants?
My (Linux/Apache) server has ben under attack for a few weeks now - via xmlrpc.php and wp-login.php - both Wordpress script files.
I took the liberty of adding some code to email me the POST data, etc.
What I am seeing for the xmlrpc attacks is POST…

Colin G
- 309
- 3
- 14
2
votes
1 answer
Denial of Service: Regular Expression (Input Validation and Representation, Data Flow)
I am using HP Fortify tool to detect the vulnerability of my project and it is giving some code vulnerable to DOS attack.
while reading some regular expression through some '.properties' and then trying to create a pattern by…

Vicky
- 1,135
- 1
- 17
- 37
2
votes
1 answer
What exactly is meant by 'External Service Interaction' reported by Burp Suite?
Upon running the Burp Security Suite on our web application, I'm getting an issue like 'External Service Interaction' in a page where there's an textbox for getting email addresses. Think of it like inviting other people to our website.
The page is…
user937999
2
votes
1 answer
Weird "Missing template" exception in rails app on production
I have an Exception notifier set up in my rails application. So today I got the second notification, that the index template is missing:
An ActionView::MissingTemplate occurred in products#index:
Missing template products/index, application/index…

Besi
- 22,579
- 24
- 131
- 223
2
votes
0 answers
How do I safeguard against the OpenSSL vulnerability until I can patch it?
The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers…

Jack
- 21
- 2
2
votes
0 answers
Resource Injection vulnerability
Am trying to resolve a resource injection issue found in our code by Fortify Static scan. We have updateUserInfo(User user) method in Service class which makes a call to updateUser(User user) method on Dao class. updateUser(User user) method code…

Pro
- 582
- 2
- 8
- 23
2
votes
1 answer
What does this piece of code mean in PHP?
Upon updating a PHP website, I came across this piece of code.
It doesn't make any sense.
What could be this??
An attack on website or something???

Sajeev C
- 1,538
- 4
- 17
- 30
1
vote
0 answers
How to use Python pwn tools to resolve a side channel case study
I work on class exercice that involves on find a password on a remote server. The goal is to use the Python pwn library.
When I access to the server with a nc IP port I have :
[0000014075] Initializing the exercice...
[0001678255] Looking for a …

Julien
- 699
- 3
- 14
- 30