version=pmwiki-2.1.22 ordered=1 urlencoded=1 agent=Mozilla/5.0 (X11; U; Linux i686 (x86_64); en-US; rv:1.8.0.6) Gecko/20060728 SUSE/1.5.0.6-1.3 Firefox/1.5.0.6 author=Pm csum=add faq about botnet exploit host=24.1.26.255 name=PmWiki.Security rev=28 targets=PmWiki.Passwords,PmWiki.PasswordsAdmin,PmWiki.UrlApprovals text=Distributed Pages:%0a* [[PmWiki.Passwords]] General use of passwords%0a* [[PmWiki.PasswordsAdmin]] More password options for the administrator%0a* [[PmWiki.UrlApprovals]] Require approval of Url links%0a* [[PmWiki:SiteAnalyzer]] A tool for analyzing site configuration settings and security%0a%0aCookbook Pages%0a%0a* See also [[Cookbook:Cookbook#Security | Cookbook index: Security]]%0a* [[Cookbook:Blocklist2]] Block postings based on content or IP address%0a* [[Cookbook:MTBlackList]] Movable Type spam blacklist%0a* [[Cookbook:WebServerSecurity]] Making the server more secure with .htaccess%0a* [[Cookbook:FarmSecurity]] Making Farm installations secure%0a* [[Cookbook:EProtect]] Hide e-mail address%0a* [[Cookbook:AuditImages]] Check to see what images have been uploaded to your wiki.%0a%0a%0a>>faq%3c%3c [[#faq]]%0a%0aQ: What about the botnet security advisory at [[http://isc.sans.org/diary.php?storyid=1672]]?%0a%0aA: Sites that are running with PHP's ''register_globals'' setting set to "On" and versions of PmWiki prior to 2.1.21 may be vulnerable to a botnet exploit that is taking advantage of a bug in PHP. The vulnerability can be closed by turning ''register_globals'' off, upgrading to PmWiki 2.1.21 or later, or upgrading to PHP versions 4.4.3 or 5.1.4. In addition, there is a test at [[PmWiki:SiteAnalyzer]] that can be used to determine if your site is vulnerable.%0a%0a time=1157561724