新聞中心
源頭在于wiki.php.net的漏洞導(dǎo)致wiki賬號(hào)被盜,而wiki的賬號(hào)和php代碼源的SVN提交權(quán)限相關(guān)聯(lián)。

目前成都創(chuàng)新互聯(lián)已為1000多家的企業(yè)提供了網(wǎng)站建設(shè)、域名、網(wǎng)頁空間、網(wǎng)站托管、企業(yè)網(wǎng)站設(shè)計(jì)、榆林網(wǎng)站維護(hù)等服務(wù),公司將堅(jiān)持客戶導(dǎo)向、應(yīng)用為本的策略,正道將秉承"和諧、參與、激情"的文化,與客戶和合作伙伴齊心協(xié)力一起成長(zhǎng),共同發(fā)展。
有圖有真相:
原文:
The wiki.php.net box was compromised and the attackers were able to collect wiki account credentials. No other machines in the php.net infrastructure appear to have been affected. Our biggest concern is, of course, the integrity of our source code. We did an extensive code audit and looked at every commit since 5.3.5 to make sure that no stolen accounts were used to inject anything malicious. Nothing was found. The compromised machine has been wiped and we are forcing a password change for all svn accounts.
We are still investigating the details of the attack which combined a vulnerability in the Wiki software with a Linux root exploit.
內(nèi)容大致是:
由于wiki賬號(hào)被盜,PHP的代碼源極有可能被污染,當(dāng)然,PHP團(tuán)隊(duì)已經(jīng)做最大的努力以保證自PHP5.3.5版本的代碼沒有收到污染,并且強(qiáng)迫SVN修改現(xiàn)有的密碼。
而事件目前的狀態(tài)是,他們?nèi)匀粵]法鎖定漏洞所在,因?yàn)樗麄內(nèi)栽谂挪椤?/p>
一個(gè)很明顯的問題是,PHP5.3.6以及其后續(xù)版本的代碼已經(jīng)被污染,目前只能把未受污染的代碼版本確保到PHP5.3.5,下載PHP代碼的人,要小心了。
而windows.php.net和wiki.php.net也已經(jīng)暫停訪問。
原文鏈接:http://www.oschina.net/news/16612/php-cracked
本文標(biāo)題:有圖有真相PHP代碼源被黑了
路徑分享:http://fisionsoft.com.cn/article/ccsosie.html


咨詢
建站咨詢
