2012-04-01, 20:52:49
I give up, I'm going ot close the support ticket before I put my hands in a blender.........
Here's the latest :
Here's the latest :
Quote:We are not coding trained, so we cannot analyse code to see what could have caused this, unfortunately. The script injection looks most likely to have been a small file that could have been downloaded 1 maybe 2 years ago and has lain dormant in the webspace until the malicious script author invokes it to do its dirty work. We will not have logfiles to show this, so all we can say, regrettably is to upload the latest clean versions of softeware onto the site (if your software comes from a known clean source, then that is good enough for us) and then the site should be OK.
I do feel that allowing url_fopen to be active will cause problems, as that allows malicious scripting (which usually has every way possible to download and run more malicious code in it) to open remote URLs. Is there no way for you to periodically check via the software authors website for an upgrade to the software and then download and install the update, which would stop the requirement for url_fopen to be active.
djr.heliohost.org/me