Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
To be fair that's awesome. I've dealt with hacked sites and no one has ever suggested anything like that. Simple and elegant. Did you close the vulnerability?
-
@soulsuke Set up an inotify instead that listens for modifications and quarantines them until approved. Injected code can do a lot of damage in an hour.
-
soulsuke7257y@Godisalie A lot of damage? It's literally a miracle they didn't dump the db or compromise the whole machine. But I'm paranoid to think about that >.> As my boss said, wasting time on that is "not billable" >.>
-
xewl41267yI'm residing in the same environment it seems. Although I get it, money vs time is key.
If you'd just let me fix this, you'll be ...
*NO!*
k. -
joykill3407yCleaning up the files is easy... That's why you have git... Just reset it all to latest commit...
Plugging the security holes, that's something else obviously -
soulsuke7257y@joykill Oooh, that's the fun part! The guy who manages those project does not use git because "the changes made via gui are saved in the db, not in the code, so i'll just dump that". We only have some tgz of a couple of site roots, and they are outdated. Because (same guy as before) "backups are useless, the server uses raid and we'll never havr data loss". I'm still laughing about that XD
Related Rants
-
linuxxx32*client calls in* Me: good morning, how can I help you? Client: my ip is blocked, could you unblock it for m...
-
DRSDavidSoft28Found this in our codebase, apparently one of my co-workers had written this
-
linuxxx23*client calls* "hello, we forgot the password to our WiFi router. Could you reset that for us?" 😐😶😮...
The company I work for is currently maintaining some websites under an old (>1.5 years) version of Drupal, which has some well known vulnerabilities.
Yesterday we've found out somebody used them to inject php code into every single .php file on the machine. We've been discussing for hours about how to recover data, upgrade stuff, and maybe switch to something else. I've said jokingly "or we could put a find command in the crontab to sed away the php line they've injected!". Guess what we're doing now on our production servers?
rant
drupal is shit
wtf