oceano
16/06/2013, 17:33
Hola jack2,
Muchas gracias por la info
********************
In the last few hours a security exploit has been found. This email is to inform you of a temporary fix to eliminate this exploit whilst the issue is patched and transferred to our file servers for release.
Instructions:
You will need root SSH access to your master server. You are then required to delete the following file:
/usr/local/solusvm/www/centralbackup.php
*******************
o lo que es lo mismo,
rm -rf /usr/local/solusvm/www/centralbackup.php
Fuente oficial:
http://blog.soluslabs.com/2013/06/16...usvm-versions/
* para comprobar si tus máquinas están afectadas
# cd /usr/local/solusvm/www/
# grep -i -r -n "list($db_name, $db_user" *
Un saludo !
Muchas gracias por la info
********************
In the last few hours a security exploit has been found. This email is to inform you of a temporary fix to eliminate this exploit whilst the issue is patched and transferred to our file servers for release.
Instructions:
You will need root SSH access to your master server. You are then required to delete the following file:
/usr/local/solusvm/www/centralbackup.php
*******************
o lo que es lo mismo,
rm -rf /usr/local/solusvm/www/centralbackup.php
Fuente oficial:
http://blog.soluslabs.com/2013/06/16...usvm-versions/
* para comprobar si tus máquinas están afectadas
# cd /usr/local/solusvm/www/
# grep -i -r -n "list($db_name, $db_user" *
Un saludo !